Sciweavers

3420 search results - page 171 / 684
» A Language-Based Approach to Security
Sort
View
KES
2005
Springer
15 years 10 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
15 years 8 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
ICSE
1993
IEEE-ACM
15 years 8 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan
COMPSAC
2009
IEEE
15 years 8 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
COMCOM
2002
189views more  COMCOM 2002»
15 years 4 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt