Sciweavers

14850 search results - page 114 / 2970
» The Security of
Sort
View
ACISP
2004
Springer
14 years 3 months ago
Symmetric Key Authentication Services Revisited
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenba...
ASIASIM
2004
Springer
14 years 3 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
CCS
2004
ACM
14 years 3 months ago
The dual receiver cryptosystem and its applications
Theodore Diament, Homin K. Lee, Angelos D. Keromyt...
CCS
2004
ACM
14 years 3 months ago
Versatile padding schemes for joint signature and encryption
Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jar...
CCS
2004
ACM
14 years 3 months ago
Gray-box extraction of execution graphs for anomaly detection
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song