Sciweavers

6907 search results - page 279 / 1382
» Securing distributed adaptation
Sort
View
123
Voted
DAIS
2006
15 years 6 months ago
A Versatile Kernel for Distributed AOP
Abstract. Aspect-Oriented Programming (AOP) promotes better separation of concerns in software systems by introducing aspects for the modular implementation of crosscutting concern...
Éric Tanter, Rodolfo Toledo
JCS
2011
72views more  JCS 2011»
14 years 11 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 11 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
CCS
2010
ACM
15 years 4 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
151
Voted
IACR
2011
90views more  IACR 2011»
14 years 4 months ago
On the Security of the Winternitz One-Time Signature Scheme
Abstract. We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random ...
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andre...