Sciweavers

91 search results - page 1 / 19
» Survivable key compromise in software update systems
Sort
View
CCS
2010
ACM
13 years 4 months ago
Survivable key compromise in software update systems
Justin Samuel, Nick Mathewson, Justin Cappos, Roge...
CORR
1998
Springer
184views Education» more  CORR 1998»
13 years 4 months ago
Case Study in Survivable Network System Analysis
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...
ICRE
1998
IEEE
13 years 9 months ago
Requirements Definition for Survivable Network Systems
Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused...
Richard C. Linger, Nancy R. Mead, Howard F. Lipson
PERCOM
2007
ACM
14 years 4 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
IWSAS
2001
Springer
13 years 9 months ago
Model-Based Diagnosis for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attack. Successful attacks on these systems can lead to catastrophic results; the sur...
Howard E. Shrobe