Sciweavers

TISSEC
2008
133views more  TISSEC 2008»
13 years 11 months ago
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables
Gildas Avoine, Pascal Junod, Philippe Oechslin
TISSEC
2008
63views more  TISSEC 2008»
13 years 11 months ago
Formal foundations for hybrid hierarchies in GTRBAC
James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yu...
TISSEC
2008
61views more  TISSEC 2008»
13 years 11 months ago
Epidemic thresholds in real networks
Deepayan Chakrabarti, Yang Wang 0008, Chenxi Wang,...
TISSEC
2008
68views more  TISSEC 2008»
13 years 11 months ago
Dynamic access-control policies on XML encrypted data
Luc Bouganim, François Dang Ngoc, Philippe ...
TISSEC
2008
80views more  TISSEC 2008»
13 years 11 months ago
Controlled physical random functions and applications
Blaise Gassend, Marten van Dijk, Dwaine E. Clarke,...
TISSEC
2008
80views more  TISSEC 2008»
13 years 11 months ago
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cris...
TISSEC
2008
106views more  TISSEC 2008»
13 years 11 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
TISSEC
2008
84views more  TISSEC 2008»
13 years 11 months ago
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu,...
TISSEC
2008
69views more  TISSEC 2008»
13 years 11 months ago
Thwarting E-mail Spam Laundering
Mengjun Xie, Heng Yin, Haining Wang