Sciweavers

518 search results - page 49 / 104
» Abstract Interpretation-Based Protection
Sort
View
126
Voted
VIZSEC
2004
Springer
15 years 8 months ago
Managing attack graph complexity through visual hierarchical aggregation
We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation coll...
Steven Noel, Sushil Jajodia
138
Voted
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 6 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
121
Voted
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
16 years 2 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
111
Voted
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 9 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
PAM
2009
Springer
15 years 9 months ago
Monitoring the Bittorrent Monitors: A Bird's Eye View
Abstract. Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as ...
Georgos Siganos, Josep M. Pujol, Pablo Rodriguez