Sciweavers

274 search results - page 52 / 55
» Formal procedural security modeling and analysis
Sort
View
LATINCRYPT
2010
13 years 6 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
AIPS
2003
13 years 9 months ago
A Framework for Planning in Continuous-time Stochastic Domains
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Håkan L. S. Younes, David J. Musliner, Reid ...
MA
2010
Springer
104views Communications» more  MA 2010»
13 years 6 months ago
Representations of SO(3) and angular polyspectra
We characterize the angular polyspectra, of arbitrary order, associated with isotropic fields defined on the sphere S2 = (x, y, z) : x2 + y2 + z2 = 1 . Our techniques rely heavi...
D. Marinucci, G. Peccati
ANSS
2003
IEEE
14 years 1 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
CCS
2005
ACM
14 years 1 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...