Sciweavers

IJISEC
2008
188views more  IJISEC 2008»
13 years 10 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
IJISEC
2008
41views more  IJISEC 2008»
13 years 11 months ago
A multi-layer framework for puzzle-based denial-of-service defense
XiaoFeng Wang, Michael K. Reiter
IJISEC
2008
92views more  IJISEC 2008»
13 years 11 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
IJISEC
2008
69views more  IJISEC 2008»
13 years 11 months ago
A survey of certificateless encryption schemes and security models
Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
Alexander W. Dent
IJISEC
2008
108views more  IJISEC 2008»
13 years 11 months ago
A note on the Ate pairing
The Ate pairing has been suggested since it can be computed efficiently on ordinary elliptic curves with small values of the traces of Frobenius t. However, not all pairing-friendl...
Changan Zhao, Fangguo Zhang, Jiwu Huang
IJISEC
2008
119views more  IJISEC 2008»
13 years 11 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
IJISEC
2008
58views more  IJISEC 2008»
13 years 11 months ago
Keeping secrets in incomplete databases
Joachim Biskup, Torben Weibert
IJISEC
2008
46views more  IJISEC 2008»
13 years 11 months ago
A symbolic framework for multi-faceted security protocol analysis
Andrea Bracciali, GianLuigi Ferrari, Emilio Tuosto
IJISEC
2008
101views more  IJISEC 2008»
13 years 11 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
IJISEC
2008
64views more  IJISEC 2008»
13 years 11 months ago
Bayesian rational exchange
Juan M. Estévez-Tapiador, Almudena Alcaide,...