Sciweavers

3751 search results - page 70 / 751
» Events in security protocols
Sort
View
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 8 days ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
WWW
2002
ACM
15 years 10 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
SIGSOFT
2007
ACM
15 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ICDCSW
2005
IEEE
15 years 3 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
ADBIS
2004
Springer
94views Database» more  ADBIS 2004»
15 years 1 months ago
Formalization and Detection of Events over a Sliding Window in Active Databases Using Interval-Based Semantics
Trend analysis and forecasting applications (e.g., securities trading, stock market, and after-the-fact diagnosis) need event detection along a moving time window. Event-driven app...
Raman Adaikkalavan, Sharma Chakravarthy