Sciweavers

7741 search results - page 1470 / 1549
» Security in Active Networks
Sort
View
RAID
2004
Springer
15 years 9 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
139
Voted
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 9 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 9 months ago
Locational Pricing and Scheduling for an Integrated Energy-Reserve Market
It is well known that given a network that can become constrained on voltage or real power flows, reserves must also be spatially located in order to handle all credible contingen...
Jie Chen, James S. Thorp, Robert J. Thomas, Timoth...
KBSE
2003
IEEE
15 years 9 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 9 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
« Prev « First page 1470 / 1549 Last » Next »