Sciweavers

22 search results - page 2 / 5
» Serial Model for Attack Tree Computations
Sort
View
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
CRYPTO
2011
Springer
195views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Time-Lock Puzzles in the Random Oracle Model
Abstract. A time-lock puzzle is a mechanism for sending messages “to the future”. The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until e...
Mohammad Mahmoody, Tal Moran, Salil P. Vadhan
IPPS
2003
IEEE
13 years 10 months ago
Founding FireWire Bridges through Promela Prototyping
The standardisation procedure of the IEEE P1394.1 Draft Standard for High Performance Serial Bus Bridges is supported through the use of the state-of-the-art model checker Spin, w...
Izak van Langevelde, Judi Romijn, Nicolae Goga
NOSSDAV
2010
Springer
13 years 10 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
SIGCOMM
2010
ACM
13 years 5 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou