Sciweavers

529 search results - page 74 / 106
» ideas 2003
Sort
View
CCS
2003
ACM
14 years 3 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
14 years 3 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
CP
2003
Springer
14 years 3 months ago
Redundant Modeling for the QuasiGroup Completion Problem
Abstract. The Quasigroup Completion Problem (QCP) is a very challenging benchmark among combinatorial problems, and the focus of much recent interest in the area of constraint prog...
Iván Dotú, Alvaro del Val, Manuel Ce...
DFG
2003
Springer
14 years 3 months ago
Inheritance of Business Processes: A Journey Visiting Four Notorious Problems
Abstract. The new millennium is characterized by speed and distribution in every aspect of most business and organization undertaking. Organizations are challenged to bring ideas a...
Wil M. P. van der Aalst
DSOM
2003
Springer
14 years 3 months ago
Towards Peer-to-Peer Traffic Analysis Using Flows
One of the main problems with today's Internet traffic analysis is caused by the large number of network-based applications whose types and traffic patterns are more complicat...
Myung-Sup Kim, Hun-Jeong Kang, James Won-Ki Hong