Sciweavers

876 search results - page 101 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
93
Voted
POLICY
2007
Springer
15 years 7 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
92
Voted
ISMVL
2009
IEEE
107views Hardware» more  ISMVL 2009»
15 years 7 months ago
Regular Encodings from Max-CSP into Partial Max-SAT
We define a number of original encodings, called regular encodings, that map Max-CSP instances into Partial MaxSAT instances. First, we obtain new direct and (minimal) support en...
Josep Argelich, Alba Cabiscol, Inês Lynce, F...
ICICS
2009
Springer
15 years 7 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
124
Voted
IESS
2007
Springer
110views Hardware» more  IESS 2007»
15 years 7 months ago
Run-Time efficient Feasibility Analysis of Uni-Processor Systems with Static Priorities
: The performance of feasibility tests is crucial in many applications. When using feasibility tests online only a limited amount of analysis time is available. Run-time efficiency...
Karsten Albers, Frank Bodmann, Frank Slomka
83
Voted
CONEXT
2008
ACM
15 years 2 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...