Sciweavers

1028 search results - page 23 / 206
» Using Attack Graphs to Design Systems
Sort
View
FLAIRS
2003
15 years 6 months ago
Identifying Inhabitants of an Intelligent Environment Using a Graph-Based Data Mining System
The goal of the MavHome smart home project is to build an intelligent home environment that is aware of its inhabitants and their activities. Such a home is designed to provide ma...
Ritesh Mehta, Diane J. Cook, Lawrence B. Holder
PKC
2007
Springer
219views Cryptology» more  PKC 2007»
15 years 10 months ago
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
Daewan Han, Myung-Hwan Kim, Yongjin Yeom
JNW
2008
103views more  JNW 2008»
15 years 4 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
WISEC
2010
ACM
15 years 4 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
15 years 8 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller