Sciweavers

373 search results - page 19 / 75
» Two Attacks on Reduced IDEA
Sort
View
IACR
2011
161views more  IACR 2011»
12 years 7 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
CSB
2004
IEEE
124views Bioinformatics» more  CSB 2004»
13 years 11 months ago
Multiple RNA Structure Alignment
RNA structures can be viewed as a kind of special strings with some characters bonded with each other. The question of aligning two RNA structures has been studied for a while, an...
Zhuozhi Wang, Kaizhong Zhang
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
ICC
2007
IEEE
115views Communications» more  ICC 2007»
14 years 2 months ago
Security Analysis of IEEE 802.16
— This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standar...
Leonardo Maccari, Matteo Paoli, Romano Fantacci
SECURWARE
2008
IEEE
14 years 2 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin