Sciweavers

1101 search results - page 87 / 221
» On the Security and Vulnerability of PING
Sort
View
ESORICS
1998
Springer
15 years 2 months ago
Side Channel Cryptanalysis of Product Ciphers
Building on the work of Kocher[Koc96], Jaffe, and Yun [KJY98], we discuss the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion o...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
ENTCS
2008
110views more  ENTCS 2008»
14 years 10 months ago
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic
AGENTS
1999
Springer
15 years 2 months ago
The UMASS Intelligent Home Project
Intelligent environmentsareaninterestingdevelopmentandresearchapplication problem for multi-agent systems.The functionalandspatialdistribution of tasksnaturally lendsitself to a m...
Victor R. Lesser, Michael Atighetchi, Brett Benyo,...
AINA
2007
IEEE
15 years 1 months ago
Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows
Current scientific workflow models require datasets to be transferred from their source to the hosts where they can be processed. This seriously impedes data-intensive application...
Zijiang Yang, Shiyong Lu, Ping Yang
ISSA
2004
14 years 11 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche