Sciweavers

6164 search results - page 902 / 1233
» Teaching Computer Security
Sort
View
SAFECOMP
2000
Springer
15 years 8 months ago
Assessment of the Reliability of Fault-Tolerant Software: A Bayesian Approach
Fault tolerant systems based on the use of software design diversity may be able to achieve high levels of reliability more cost-effectively than other approaches, such as heroic ...
Bev Littlewood, Peter T. Popov, Lorenzo Strigini
CPA
1995
143views Cryptology» more  CPA 1995»
15 years 8 months ago
Crypto in Europe - Markets, Law and Policy
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Ross J. Anderson
OOPSLA
1997
Springer
15 years 8 months ago
Efficient Type Inclusion Tests
A type inclusion test determines whether one type is a subtype of another. Efficient type testing techniques exist for single subtyping, but not for languages with multiple subtyp...
Jan Vitek, R. Nigel Horspool, Andreas Krall
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 8 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
CCS
2008
ACM
15 years 6 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan