Sciweavers

362 search results - page 7 / 73
» Extending the Resynchronization Attack
Sort
View
ICAIL
2009
ACM
13 years 5 months ago
Case law in extended argumentation frameworks
In this paper we discuss how recent developments in argumentation frameworks, most notably Extended Argumentation Frameworks, can inform the representation of a body of case law u...
Trevor J. M. Bench-Capon, Sanjay Modgil
ICPPW
2002
IEEE
14 years 9 days ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
JALC
2006
61views more  JALC 2006»
13 years 7 months ago
Random Polynomial-Time Attacks and Dolev-Yao Models
In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao ...
Mathieu Baudet
FSE
2000
Springer
91views Cryptology» more  FSE 2000»
13 years 11 months ago
A Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on th...
Henri Gilbert, Helena Handschuh, Antoine Joux, Ser...
FMICS
2009
Springer
14 years 1 months ago
Attacking Large Industrial Code with Bi-abductive Inference
In joint work with Cristiano Calcagno, Peter O’Hearn, and Hongseok Yang, we have introduced bi-abductive inference and its use in reasoning about heap manipulating programs [5]. ...
Dino Distefano