128
click to vote
ASIAN
15 years 6 months ago
2007 Springer
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
113
click to vote
ASIAN
15 years 6 months ago
2007 Springer
Abstract. We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faul...
ASIAN
15 years 4 months ago
2007 Springer
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
79
Voted
ASIAN
15 years 6 months ago
2007 Springer
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
ASIAN
15 years 6 months ago
2007 Springer
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
|