Sciweavers

14850 search results - page 114 / 2970
» The Security of
Sort
View
108
Voted
ACISP
2004
Springer
15 years 10 months ago
Symmetric Key Authentication Services Revisited
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenba...
ASIASIM
2004
Springer
15 years 10 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
CCS
2004
ACM
15 years 10 months ago
The dual receiver cryptosystem and its applications
Theodore Diament, Homin K. Lee, Angelos D. Keromyt...
CCS
2004
ACM
15 years 10 months ago
Versatile padding schemes for joint signature and encryption
Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jar...
111
Voted
CCS
2004
ACM
15 years 10 months ago
Gray-box extraction of execution graphs for anomaly detection
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song