Sciweavers

ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
14 years 5 months ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
14 years 5 months ago
A Static Birthmark of Binary Executables Based on API Call Structure
Abstract. A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static bi...
Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Ha...
ASIAN
2007
Springer
157views Algorithms» more  ASIAN 2007»
14 years 5 months ago
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
Abstract. We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faul...
Elie Bursztein, Jean Goubault-Larrecq
ASIAN
2007
Springer
93views Algorithms» more  ASIAN 2007»
14 years 5 months ago
Static vs Dynamic Typing for Access Control in Pi-Calculus
Michele Bugliesi, Damiano Macedonio, Sabina Rossi
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
14 years 5 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
ASIAN
2007
Springer
93views Algorithms» more  ASIAN 2007»
14 years 5 months ago
Masquerade Detection Based Upon GUI User Profiling in Linux Systems
Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Neg...
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
14 years 5 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
ASIAN
2007
Springer
118views Algorithms» more  ASIAN 2007»
14 years 5 months ago
Digital Rights Management Using a Master Control Device
This paper focuses on the problem of preventing the illegal copying of digital content whilst allowing content mobility within a single user domain. This paper proposes a novel sol...
Imad M. Abbadi
ASIAN
2007
Springer
90views Algorithms» more  ASIAN 2007»
14 years 5 months ago
On Run-Time Enforcement of Policies
Harshit J. Shah, R. K. Shyamasundar
APPROX
2007
Springer
112views Algorithms» more  APPROX 2007»
14 years 5 months ago
On Approximating the Average Distance Between Points
Abstract. We consider the problem of approximating the average distance between pairs of points in a high-dimensional Euclidean space, and more generally in any metric space. We co...
Kfir Barhum, Oded Goldreich, Adi Shraibman