Sciweavers

1186 search results - page 129 / 238
» A New Approach to Secure Logging
Sort
View
103
Voted
CORR
2008
Springer
155views Education» more  CORR 2008»
15 years 25 days ago
On Wiretap Networks II
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume ...
Salim Y. El Rouayheb, Emina Soljanin
ENTCS
2007
129views more  ENTCS 2007»
15 years 21 days ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
99
Voted
ICWE
2009
Springer
15 years 7 months ago
Trust and Reputation Mining in Professional Virtual Communities
Abstract. Communication technologies, such as e-mail, instant messaging, discussion forums, blogs, and newsgroups connect people together, forming virtual communities. This concept...
Florian Skopik, Hong Linh Truong, Schahram Dustdar
174
Voted
FOCS
1997
IEEE
15 years 5 months ago
Beyond the Flow Decomposition Barrier
We introduce a new approach to the maximum flow problem. This approach is based on assigning arc lengths based on the residual flow value and the residual arc capacities. Our appro...
Andrew V. Goldberg, Satish Rao
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...