Sciweavers

1028 search results - page 32 / 103
» Using Attack Graphs to Design Systems
Sort
View
87 views 91 votes 15 years 5 months ago  HUC 2009»
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
119 views 94 votes 15 years 1 months ago  ENTCS 2008»
Graphical notations are already popular for the design of software, as witnessed by the success of the Uniform Modeling Languages (UML). In this paper, we advocate the use of grap...
118 views 75 votes 15 years 7 months ago  SAMOS 2007»
—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together ...
231 views 131 votes 15 years 8 months ago  WISEC 2009»
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
131 views 124 votes 15 years 6 months ago  IV 2005»
Visualising large graphs faces the challenges of both data complexity and visual complexity. This paper presents a framework for visualising large graphs that reduces data complex...
127 views 111 votes 15 years 2 months ago  CMS 2006»
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
100 views 120 votes 15 years 29 days ago  JCS 2002»
STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as seq...
190 views 139 votes 14 years 11 months ago  CASES 2010»
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
139 views 96 votes 15 years 7 months ago  INFOCOM 2006»
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
140 views 119 votes 15 years 2 months ago  NETWORKING 2007»
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...