Sciweavers

8644 search results - page 39 / 1729
» On the Composition of Secure Systems
Sort
View
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 7 months ago
On the Security of Huang-Chang Multi-signature Schemes
Recently, based on RSA and discrete logarithm with composite modulus, Huang and Chang proposed two multisignature schemes with distinguished signing authority and claimed that the...
Jianhong Zhang, Wei Zou
IMC
2004
ACM
14 years 1 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
IEEEARES
2010
IEEE
14 years 2 months ago
Information Flow in Disaster Management Systems
Achim D. Brucker, Dieter Hutter