Sciweavers

TISSEC
2008
133views more  TISSEC 2008»
13 years 3 months ago
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables
Gildas Avoine, Pascal Junod, Philippe Oechslin
TISSEC
2008
63views more  TISSEC 2008»
13 years 4 months ago
Formal foundations for hybrid hierarchies in GTRBAC
James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yu...
TISSEC
2008
61views more  TISSEC 2008»
13 years 4 months ago
Epidemic thresholds in real networks
Deepayan Chakrabarti, Yang Wang 0008, Chenxi Wang,...
TISSEC
2008
68views more  TISSEC 2008»
13 years 4 months ago
Dynamic access-control policies on XML encrypted data
Luc Bouganim, François Dang Ngoc, Philippe ...
TISSEC
2008
80views more  TISSEC 2008»
13 years 4 months ago
Controlled physical random functions and applications
Blaise Gassend, Marten van Dijk, Dwaine E. Clarke,...
TISSEC
2008
106views more  TISSEC 2008»
13 years 4 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
TISSEC
2008
84views more  TISSEC 2008»
13 years 4 months ago
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu,...
TISSEC
2008
69views more  TISSEC 2008»
13 years 4 months ago
Thwarting E-mail Spam Laundering
Mengjun Xie, Heng Yin, Haining Wang