Sciweavers

3605 search results - page 721 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 4 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
IANDC
2011
129views more  IANDC 2011»
12 years 12 months ago
Rigid tree automata and applications
We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a res...
Florent Jacquemard, Francis Klay, Camille Vacher
ACSW
2006
13 years 6 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
GI
2003
Springer
13 years 10 months ago
IT-Sicherheit durch konsequente Aggregation von Analysewerkzeugen
: Bis heute wird die Sicherheit bei der Entwicklung von IT-Systemen eher stiefmütterlich behandelt. Die Hauptursache hierfür liegt in extrem kurzen Innovationszyklen: Unternehmen...
Thomas Schwenkler, Stephan Groß, Kai Simon
CBMS
2004
IEEE
13 years 8 months ago
Online Medical Teaching Case Database
Page >> Table of Contents >> Abstract 17th IEEE Symposium on Computer-Based Medical Systems (CBMS'04) p. 420 Online Medical Teaching Case Database Susan Kansagra, ...
Susan Kansagra, Chris Chang, Saleem Hussain, Grego...