Sciweavers

152 search results - page 11 / 31
» On Signatures of Knowledge
Sort
View
CCS
2003
ACM
14 years 18 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
INFOCOM
2006
IEEE
14 years 1 months ago
Contribution of Anomalies Detection and Analysis on Traffic Engineering
—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria an...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
EUROCRYPT
2006
Springer
13 years 11 months ago
Perfect Non-interactive Zero Knowledge for NP
Non-interactive zero-knowledge (NIZK) proof systems are fundamental cryptographic primitives used in many constructions, including CCA2-secure cryptosystems, digital signatures, an...
Jens Groth, Rafail Ostrovsky, Amit Sahai
SAC
2005
ACM
14 years 28 days ago
The employment of XML standards in electronic judicial proceedings
The electronic court proceedings would provide many advantages: reducing time of justice, such a method to promote ease of transport, facilitating the drafting of subsequent judge...
Alessandra Villecco Bettelli
ESORICS
2005
Springer
14 years 27 days ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento