Sciweavers

1028 search results - page 31 / 103
» Using Attack Graphs to Design Systems
Sort
View
157 views 98 votes 15 years 7 months ago  CHES 2007»
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
166 views 85 votes 15 years 1 months ago  IJNSEC 2008»
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
182 views 117 votes 15 years 8 months ago  VLSID 2009»
Abstract— This paper introduces a fuzzy logic based guidance architecture to a graph grammar framework for automated design of analog circuits. The grammar generates circuit topo...
169 views 113 votes 15 years 7 months ago  IWNAS 2008»
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
178 views 119 votes 15 years 8 months ago  ICASSP 2009»
We present a factor graph based design of a receiver for pilotassisted OFDM-IDMA systems transmitting over frequency-selective channels. The receiver performs joint iterative mult...
87 views 91 votes 15 years 5 months ago  HUC 2009»
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
119 views 94 votes 15 years 1 months ago  ENTCS 2008»
Graphical notations are already popular for the design of software, as witnessed by the success of the Uniform Modeling Languages (UML). In this paper, we advocate the use of grap...
118 views 75 votes 15 years 7 months ago  SAMOS 2007»
—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together ...
231 views 131 votes 15 years 8 months ago  WISEC 2009»
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
131 views 124 votes 15 years 6 months ago  IV 2005»
Visualising large graphs faces the challenges of both data complexity and visual complexity. This paper presents a framework for visualising large graphs that reduces data complex...