Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
This paper presents a stochastic iteration algorithm solving the global illumination problem, where the random sampling is governed by classical importance sampling and also by th...
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new ...
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...