145
click to vote
GAMESEC
14 years 11 months ago
2010
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
GAMESEC
14 years 11 months ago
2010 100
click to vote
GAMESEC
14 years 11 months ago
2010
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
134
click to vote
GAMESEC
14 years 11 months ago
2010
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
119
click to vote
GAMESEC
14 years 11 months ago
2010
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
|