Sciweavers

ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
13 years 10 months ago
How to do Things with Cryptographic Protocols
Joshua D. Guttman
ASIAN
2007
Springer
72views Algorithms» more  ASIAN 2007»
13 years 10 months ago
Information Flow Testing
Gurvan Le Guernic
ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
13 years 10 months ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
13 years 10 months ago
A Static Birthmark of Binary Executables Based on API Call Structure
Abstract. A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static bi...
Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Ha...
ASIAN
2007
Springer
157views Algorithms» more  ASIAN 2007»
13 years 10 months ago
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
Abstract. We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faul...
Elie Bursztein, Jean Goubault-Larrecq
ASIAN
2007
Springer
93views Algorithms» more  ASIAN 2007»
13 years 10 months ago
Static vs Dynamic Typing for Access Control in Pi-Calculus
Michele Bugliesi, Damiano Macedonio, Sabina Rossi
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
13 years 10 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
ASIAN
2007
Springer
93views Algorithms» more  ASIAN 2007»
13 years 10 months ago
Masquerade Detection Based Upon GUI User Profiling in Linux Systems
Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Neg...
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
13 years 10 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada