Sciweavers

362 search results - page 43 / 73
» Extending the Resynchronization Attack
Sort
View
132
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 13 days ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
133
Voted
ICITS
2009
15 years 10 days ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
145
Voted

Publication
117views
14 years 10 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
126
Voted
JNCA
2011
123views more  JNCA 2011»
14 years 9 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
364
Voted

Book
2028views
16 years 10 months ago
TCL Wise - Guide to the TCL Programming Language
"this book is an introduction to the main ideas of the Tcl programming language: If you wish to learn a simple and powerful programming language, this book is for you. To read...
Salvatore Sanfilippo