179
Voted
ICICS
15 years 11 months ago
2009 Springer
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
150
click to vote
ICICS
15 years 11 months ago
2009 Springer
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
126
Voted
ICICS
15 years 11 months ago
2009 Springer 129
click to vote
ICICS
15 years 11 months ago
2009 Springer
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
|