Sciweavers

5234 search results - page 306 / 1047
» Method Components - Rationale Revealed
Sort
View
IWIA
2003
IEEE
15 years 9 months ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
WPES
2003
ACM
15 years 9 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
BIRTHDAY
2003
Springer
15 years 9 months ago
A Hierarchical Completeness Proof for Propositional Temporal Logic
Abstract. We present a new proof of axiomatic completeness for Proposition Temporal Logic (PTL) for discrete, linear time for both finite and infinite time (without past-time). T...
Ben C. Moszkowski
CTRSA
2003
Springer
120views Cryptology» more  CTRSA 2003»
15 years 9 months ago
Simple Backdoors for RSA Key Generation
We present extremely simple ways of embedding a backdoor in the key generation scheme of RSA. Three of our schemes generate two genuinely random primes p and q of a given size, to...
Claude Crépeau, Alain Slakmon
ECAL
2003
Springer
15 years 9 months ago
Visualizing Evolutionary Dynamics of Self-Replicators Using Graph-Based Genealogy
We present a general method for evaluating and visualizing evolutionary dynamics of self-replicators using a graph-based representation for genealogy. Through a transformation from...
Chris Salzberg, Antony Antony, Hiroki Sayama