156
click to vote
ICICS
15 years 10 months ago
2009 Springer
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
128
click to vote
ICICS
15 years 10 months ago
2009 Springer
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
111
Voted
ICICS
15 years 10 months ago
2009 Springer 105
Voted
ICICS
15 years 10 months ago
2009 Springer
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
|