Sciweavers

373 search results - page 36 / 75
» Two Attacks on Reduced IDEA
Sort
View
IDEAS
1997
IEEE
93views Database» more  IDEAS 1997»
13 years 11 months ago
Schema Evolution in Object Databases by Catalogs
We are concerned by schema evolution in Object Oriented Databases (OODB) that is processed by a modification on the classes on the schema. We present a new categorization of the d...
Anne Pons, Rudolf K. Keller
NDSS
2005
IEEE
14 years 1 months ago
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary,...
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose ...
DSN
2007
IEEE
13 years 11 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 7 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
GRC
2007
IEEE
14 years 2 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...