Sciweavers

1028 search results - page 26 / 103
» Using Attack Graphs to Design Systems
Sort
View
96 views 114 votes 15 years 1 months ago  IJNSEC 2008»
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
119 views 104 votes 15 years 7 months ago  COMSWARE 2007»
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
178 views 139 votes 14 years 8 months ago  TCOS 2010»
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
164 views 114 votes 15 years 8 months ago  HOST 2009»
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
150 views 116 votes 14 years 11 months ago  SICHERHEIT 2010»
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
75 views 75 votes 15 years 6 months ago  DATE 2002»
With the term flexibility, we introduce a new design dimension of an embedded system that quantitatively characterizes its feasibility in implementing not only one, but possibly ...
87 views 126 votes 14 years 8 months ago  JCS 2011»
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
108 views 117 votes 15 years 2 months ago  CSREASAM 2004»
Grid systems are designed to support very large data set computations, that potentially access significant resources spread through several organizations. These resources can be v...
116 views 121 votes 15 years 2 months ago  NAACL 2007»
We introduce a simple opinion mining system for analyzing Japanese Weblog reviews called OMS-J. OMS-J is designed to provide an intuitive visual GUI of opinion mining graphs for a...
106 views 97 votes 15 years 2 months ago  ISSA 2004»
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...