Sciweavers

197 search results - page 28 / 40
» Is attack better than defense
Sort
View
SCAM
2003
IEEE
14 years 23 days ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
TC
2008
13 years 7 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
LPAR
2005
Springer
14 years 1 months ago
Inference from Controversial Arguments
Abstract. We present new careful semantics within Dung’s theory of argumentation. Under such careful semantics, two arguments cannot belong to the same extension whenever one of ...
Sylvie Coste-Marquis, Caroline Devred, Pierre Marq...
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
14 years 23 days ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
CIS
2006
Springer
13 years 11 months ago
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko