Sciweavers

12183 search results - page 133 / 2437
» Computers under Attacks!
Sort
View
MFCS
2007
Springer
15 years 10 months ago
Selfish Load Balancing Under Partial Knowledge
Elias Koutsoupias, Panagiota N. Panagopoulou, Paul...
SADM
2010
100views more  SADM 2010»
14 years 11 months ago
Co-clustering numerical data under user-defined constraints
Ruggero G. Pensa, Jean-François Boulicaut, ...
IJNSEC
2008
128views more  IJNSEC 2008»
15 years 4 months ago
Attacking LCCC Batch Verification of RSA Signatures
Batch verification of digital signatures is used to improve the computational complexity when a large number of digital signatures must be verified. Lee at al. [2] proposed a new ...
Martin Stanek
EUROCRYPT
2010
Springer
15 years 9 months ago
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-rel...
Kenneth G. Paterson, Gaven J. Watson