165
click to vote
ICICS
15 years 11 months ago
2009 Springer
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
138
click to vote
ICICS
15 years 11 months ago
2009 Springer
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
114
click to vote
ICICS
15 years 11 months ago
2009 Springer
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
|