Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
SEC
1992
10 years 2 months ago
Cryptographic Protocols and Network Security
Patrick Horster, Hans-Joachim Knobloch
SEC
1996
10 years 2 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
SEC
1996
10 years 2 months ago
Location management strategies increasing privacy in mobile communication
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our obj...
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, A...
SEC
1993
10 years 2 months ago
LUC: A New Public Key System
We describe public key cryptosystems and analyse the RSA cryptosystem, pointing out a weakness (already known) of the RSA system. We define Lucas functions and derive some of thei...
Peter J. Smith, Michael J. J. Lennon
SEC
1993
10 years 2 months ago
Teaching Computer Security
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
SEC
1997
10 years 2 months ago
Individual management of personal reachability in mobile communication
Martin Reichenbach, Herbert Damker, Hannes Federra...
SEC
1997
10 years 2 months ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng
SEC
1997
10 years 2 months ago
Securing communications over ATM networks
Maryline Laurent, Olivier Paul, Pierre Rolin
SEC
2000
10 years 2 months ago
CARDS: A Distributed System for Detecting Coordinated Attacks
Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil...
books