128
click to vote
ICICS
15 years 7 months ago
2009 Springer
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
103
click to vote
ICICS
15 years 7 months ago
2009 Springer
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
ICICS
15 years 7 months ago
2009 Springer ICICS
15 years 7 months ago
2009 Springer
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
|