Sciweavers

530 search results - page 48 / 106
» Practical Threshold Signatures
Sort
View
CRYPTO
1992
Springer
138views Cryptology» more  CRYPTO 1992»
14 years 2 days ago
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
Using a number field sieve, discrete logarithms modulo primes of special forms can be found faster than standard primes. This has raised concerns about trapdoors in discrete log cr...
Daniel M. Gordon
ICARIS
2007
Springer
14 years 2 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
CSREASAM
2003
13 years 9 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
TCAD
2008
92views more  TCAD 2008»
13 years 7 months ago
IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level
Abstract--This paper proposes an adaptive watermarking technique by modulating some closed cones in an originally optimized logic network (master design) for technology mapping. Th...
Aijiao Cui, Chip-Hong Chang, Sofiène Tahar
APSEC
1998
IEEE
14 years 7 days ago
A Comprehensive Interface Definition Framework for Software Components
Component based software engineering (CBSE) represents an exciting and promising paradigm for software development, attracting much interest and effort from industrial practice an...
Jun Han