Sciweavers

1186 search results - page 179 / 238
» A New Approach to Secure Logging
Sort
View
135
Voted
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 7 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 7 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
99
Voted
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
FPL
2007
Springer
154views Hardware» more  FPL 2007»
15 years 6 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...
96
Voted
ISI
2005
Springer
15 years 6 months ago
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
Experiments were conducted to test several hypotheses on methods for improving document classification for the malicious insider threat problem within the Intelligence Community. ...
Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balas...