Sciweavers

1679 search results - page 19 / 336
» Security Properties and CSP
Sort
View
CORR
2004
Springer
88views Education» more  CORR 2004»
13 years 7 months ago
A Trace Logic for Local Security Properties
Ricardo Corin, Antonio Durante, Sandro Etalle, Pie...
WWW
2010
ACM
14 years 29 days ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
COLCOM
2007
IEEE
14 years 2 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
CP
2007
Springer
14 years 1 months ago
Min-Domain Ordering for Asynchronous Backtracking
Ordering heuristics are a powerful tool in CSP search algorithms. Among the most successful ordering heuristics are heuristics which enforce a fail first strategy by using the mi...
Roie Zivan, Moshe Zazone, Amnon Meisels
ACISP
2004
Springer
14 years 1 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim