Sciweavers

583 search results - page 82 / 117
» On the Complexity of Matsui's Attack
Sort
View
BNCOD
2004
65views Database» more  BNCOD 2004»
13 years 9 months ago
Reducing Damage Assessment Latency in Survivable Databases
Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
WSCG
2004
142views more  WSCG 2004»
13 years 9 months ago
Metropolis Iteration for Global Illumination
This paper presents a stochastic iteration algorithm solving the global illumination problem, where the random sampling is governed by classical importance sampling and also by th...
László Szirmay-Kalos, Bálazs ...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 8 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
IJSN
2006
96views more  IJSN 2006»
13 years 8 months ago
A new signature scheme without random oracles
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new ...
Chik How Tan
IJSN
2006
116views more  IJSN 2006»
13 years 8 months ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon