Fantasy 发表于 2025-3-27 00:47:24

Identification of Cryptographically Strong and Weak Pseudorandom Bit Generatorse security of information is at stack. In this paper we are giving a model which will use confidence interval and multidimentional scaling for their identification. This statistical model can be used to estimate the strength of a new PRBGs.

Palpate 发表于 2025-3-27 02:09:31

0302-9743 ed in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.978-3-540-89861-0978-3-540-89862-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

小样他闲聊 发表于 2025-3-27 06:05:45

http://reply.papertrans.cn/47/4656/465535/465535_33.png

absorbed 发表于 2025-3-27 11:06:30

Real-Time Alert Correlation with Type Graphsk is to present a novel type-graph algorithm which unifies correlation and hypothesizing in to a single operation. Our experimental results indicate that the approach is extremely efficient in the face of intensive alerts and produces compact output graphs comparable to other techniques.

经典 发表于 2025-3-27 16:41:48

http://reply.papertrans.cn/47/4656/465535/465535_35.png

争议的苹果 发表于 2025-3-27 18:52:07

http://reply.papertrans.cn/47/4656/465535/465535_36.png

DALLY 发表于 2025-3-28 00:14:00

A Robust Reputation Scheme for Decentralized Group Management Systemsecific scenarios, which can be used by malicious entities to take advantage of the system. We also present a new reputation scheme, designed to satisfy these properties, and we compare it to existing research works.

Amplify 发表于 2025-3-28 05:50:41

Revisiting Bluetooth Security (Short Paper) where security relies on elliptic curve discrete logarithms problem. The latter provides some additional security services, but with added cost compared to the former one. Both protocols provide mutual authentication, resist known and possible threats, and achieve efficiency compared to other protocols.

SEMI 发表于 2025-3-28 09:57:42

Proxy Re-signature Schemesed on bilinear groups. We propose another solution for the same problem using the property of forward-security. With a minor change in resigning key, we can make the scheme to behave as a multi-use bidirectional scheme. To address the second open problem, we have come up with schemes to convert Schnorr/ElGamal Signatures to RSA signature.

Sarcoma 发表于 2025-3-28 12:03:46

A Parallel Architecture for Stateful, High-Speed Intrusion Detectionks. The algorithm is able to perform stateful signature matching and has been implemented only using off-the-shelf components. Our initial experiments confirm that, by making the rule matching process parallel, it is possible to achieve a scalable implementation of a stateful, network-based intrusion detection system.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Systems Security; 4th International Co R. Sekar,Arun K. Pujari Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 20