Sciweavers

352 search results - page 54 / 71
» Adaptively Secure Multi-Party Computation
Sort
View
91
Voted
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 2 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
106
Voted
RAID
2007
Springer
15 years 8 months ago
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
Abstract. In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addre...
Matthias Vallentin, Robin Sommer, Jason Lee, Craig...
121
Voted
CRYPTO
1997
Springer
169views Cryptology» more  CRYPTO 1997»
15 years 6 months ago
Deniable Encryption
Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices and also the secret ...
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostr...
RTAS
1996
IEEE
15 years 6 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
160
Voted
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent