Sciweavers

591 search results - page 44 / 119
» Securing the Broker Pattern
Sort
View
ACSAC
1998
IEEE
14 years 1 months ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
ATAL
2008
Springer
13 years 11 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...
PRL
1998
85views more  PRL 1998»
13 years 9 months ago
Large encrypting binary images with higher security
In this paper, we present a new approach for encrypting binary images. Putting different scan patterns at the same level in Ž .the scan tree structure and employing a two-dimensi...
Kuo-Liang Chung, Lung-Chun Chang
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
DAC
2007
ACM
14 years 10 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf