Sciweavers

12183 search results - page 74 / 2437
» Computers under Attacks!
Sort
View
CRYPTO
1998
Springer
119views Cryptology» more  CRYPTO 1998»
14 years 2 months ago
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive chosen ciphertext attack under standard intractabili...
Ronald Cramer, Victor Shoup
JNSM
2008
93views more  JNSM 2008»
13 years 10 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
14 years 1 months ago
Computing the Algebraic Immunity Efficiently
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Frédéric Didier, Jean-Pierre Tillich
KIVS
2005
Springer
14 years 3 months ago
A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks
Patrick Diebold, Andreas Hess, Günter Sch&aum...