Sciweavers

1028 search results - page 39 / 103
» Using Attack Graphs to Design Systems
Sort
View
121 views 97 votes 15 years 6 months ago  CCS 2004»
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
178 views 129 votes 15 years 6 months ago  HIPC 2005»
Graph theoretic problems are representative of fundamental computations in traditional and emerging scientific disciplines like scientific computing, computational biology and b...
127 views 90 votes 16 years 2 months ago  WWW 2008»
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
157 views 130 votes 16 years 1 months ago  EUROCRYPT 2009»
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
127 views 99 votes 15 years 7 months ago  SP 2006»
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
177 views 96 votes 16 years 1 months ago  CHI 2007»
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
192 views 124 votes 15 years 8 months ago  CCS 2009»
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
183 views 119 votes 15 years 6 months ago  RAID 2004»
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
108 views 134 votes 15 years 6 months ago  ASIACRYPT 2005»
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption/decryption rate attracted considerable interest until it ...
149 views 107 votes 16 years 2 months ago  DAC 2005»
In the design of highly complex, heterogeneous, and concurrent systems, deadlock detection and resolution remains an important issue. In this paper, we systematically analyze the ...