Sciweavers

920 search results - page 85 / 184
» Selecting Secure Passwords
Sort
View
EUROCRYPT
2008
Springer
13 years 11 months ago
Protocols and Lower Bounds for Failure Localization in the Internet
Abstract. A secure failure-localization path-quality-monitoring (FLPQM) protocols allows a sender to localize faulty links on a single path through a network to a receiver, even wh...
Boaz Barak, Sharon Goldberg, David Xiao
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 3 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
DRM
2004
Springer
14 years 3 months ago
Analysis of an incentives-based secrets protection system
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the con...
N. Boris Margolin, Matthew Wright, Brian Neil Levi...
FC
2010
Springer
169views Cryptology» more  FC 2010»
14 years 29 days ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
ACSAC
2003
IEEE
14 years 3 months ago
A Multi-View Tool for Checking the Security Semantics of Router Configurations
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that track...
Holger Peine, Reinhard Schwarz