Sciweavers

1970 search results - page 255 / 394
» Security Without Firewalls
Sort
View
AGENTS
1997
Springer
15 years 8 months ago
An Adaptive Web Page Recommendation Service
An adaptive recommendation service seeks to adapt to its users, providing increasingly personalized recommendations over time. In this paper we introduce the \Fab" adaptive W...
Marko Balabanovic
ASIACRYPT
2007
Springer
15 years 8 months ago
On Tweaking Luby-Rackoff Blockciphers
Abstract. Tweakable blockciphers, first formalized by Liskov, Rivest, and Wagner [13], are blockciphers with an additional input, the tweak, which allows for variability. An open p...
David Goldenberg, Susan Hohenberger, Moses Liskov,...
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 7 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
DAC
2007
ACM
15 years 7 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ACSAC
2004
IEEE
15 years 7 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das