找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Systems Security; 4th International Co R. Sekar,Arun K. Pujari Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 20

[复制链接]
楼主: 诡计
发表于 2025-3-27 00:47:24 | 显示全部楼层
Identification of Cryptographically Strong and Weak Pseudorandom Bit Generatorse security of information is at stack. In this paper we are giving a model which will use confidence interval and multidimentional scaling for their identification. This statistical model can be used to estimate the strength of a new PRBGs.
发表于 2025-3-27 02:09:31 | 显示全部楼层
0302-9743 ed in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.978-3-540-89861-0978-3-540-89862-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-27 06:05:45 | 显示全部楼层
发表于 2025-3-27 11:06:30 | 显示全部楼层
Real-Time Alert Correlation with Type Graphsk is to present a novel type-graph algorithm which unifies correlation and hypothesizing in to a single operation. Our experimental results indicate that the approach is extremely efficient in the face of intensive alerts and produces compact output graphs comparable to other techniques.
发表于 2025-3-27 16:41:48 | 显示全部楼层
发表于 2025-3-27 18:52:07 | 显示全部楼层
发表于 2025-3-28 00:14:00 | 显示全部楼层
A Robust Reputation Scheme for Decentralized Group Management Systemsecific scenarios, which can be used by malicious entities to take advantage of the system. We also present a new reputation scheme, designed to satisfy these properties, and we compare it to existing research works.
发表于 2025-3-28 05:50:41 | 显示全部楼层
Revisiting Bluetooth Security (Short Paper) where security relies on elliptic curve discrete logarithms problem. The latter provides some additional security services, but with added cost compared to the former one. Both protocols provide mutual authentication, resist known and possible threats, and achieve efficiency compared to other protocols.
发表于 2025-3-28 09:57:42 | 显示全部楼层
Proxy Re-signature Schemesed on bilinear groups. We propose another solution for the same problem using the property of forward-security. With a minor change in resigning key, we can make the scheme to behave as a multi-use bidirectional scheme. To address the second open problem, we have come up with schemes to convert Schnorr/ElGamal Signatures to RSA signature.
发表于 2025-3-28 12:03:46 | 显示全部楼层
A Parallel Architecture for Stateful, High-Speed Intrusion Detectionks. The algorithm is able to perform stateful signature matching and has been implemented only using off-the-shelf components. Our initial experiments confirm that, by making the rule matching process parallel, it is possible to achieve a scalable implementation of a stateful, network-based intrusion detection system.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 17:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表