Sciweavers

1028 search results - page 63 / 103
» Using Attack Graphs to Design Systems
Sort
View
139 views 118 votes 15 years 5 months ago  SPAA 2000»
In this paper, we study the design of fault tolerant networks for arrays and meshes by adding redundant nodes and edges. For a target graph G (linear array or mesh in this paper),...
92 views 88 votes 15 years 7 months ago  DATE 2007»
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
126 views 120 votes 15 years 1 months ago  ASE 1999»
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
170 views 160 votes 15 years 1 months ago  ISLPED 2010»
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
83 views 91 votes 15 years 6 months ago  ESORICS 2005»
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
146 views 122 votes 15 years 6 months ago  ICCS 2004»
The Knowledge Agent Mediation Language (KNAML) is designed for use in multi-agent reasoning systems. Like conceptual graphs, KNAML represents knowledge using concepts, relations, a...
244 views 133 votes 16 years 1 months ago  KDD 2007»
In this paper, we design recommender systems for weblogs based on the link structure among them. We propose algorithms based on refined random walks and spectral methods. First, w...
190 views 131 votes 14 years 10 months ago  CCS 2010»
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
88 views 86 votes 15 years 7 months ago  KIVS 2007»
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
153 views 104 votes 15 years 7 months ago  IPPS 2007»
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...