Sciweavers

949 search results - page 157 / 190
» Design methods for security and trust
Sort
View
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 7 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
SEC
2008
15 years 5 months ago
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators
In an on-line transaction, a user sends her personal sensitive data (e.g., password) to a server for authentication. This process is known as Single Sign-On (SSO). Subject to phish...
Yongdong Wu, Haixia Yao, Feng Bao
135
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Justification of Smart Sensors for Nuclear Applications
This paper describes the results of a research study sponsored by the UK nuclear industry into methods of justifying smart sensors. Smart sensors are increasingly being used in the...
Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra...
WSC
2007
15 years 6 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
IWEC
2008
15 years 5 months ago
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...