نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

Journal: :International Journal of Security, Privacy and Trust Management 2012

2013
Dana Dachman-Soled

We present a construction of a CCA2-secure encryption scheme from a plaintext aware, weakly simulatable public key encryption scheme. The notion of plaintext aware, weakly simulatable public key encryption has been considered previously by Myers, Sergi and shelat (SCN, 2012) and natural encryption schemes such as the Damg̊ard Elgamal Scheme (Damg̊ard, Crypto, 1991) and the Cramer-Shoup Lite Schem...

2008
Bo Zhang Eugene Ng

Recent studies have discovered that the Internet delay space has many interesting properties such as triangle inequality violations (TIV), clustering structures, and constrained growth. Understanding these properties has so far benefited the design of network models and network-performance-aware systems. In this paper, we consider an interesting, previously unexplored connection between Interne...

Journal: :Computers in Human Behavior 2006
Brian P. Bailey Joseph A. Konstan

This paper reports results from a controlled experiment (N = 50) measuring effects of interruption on task completion time, error rate, annoyance, and anxiety. The experiment used a sample of primary and peripheral tasks representative of those often performed by users. Our experiment differs from prior interruption experiments because it measures effects of interrupting a user’s tasks along bo...

2007
Yongyun Cho Kyoungho Shin Jongsun Choi Jaeyoung Choi

Recently, there are many studies to adopt the workflow model, which has been successively applied to traditional computing environments, into ubiquitous computing environments for context-aware and autonomous services. A service in the ubiquitous computing environments must be executed according to a user’s situation information, which is generated dynamically from sensors. However, such existi...

2010
Paul Barford Marc Dacier Thomas G. Dietterich Matt Fredrikson Jonathon T. Giffin Sushil Jajodia Somesh Jha Jason H. Li Peng Liu Peng Ning Xinming Ou Dawn Xiaodong Song Laura Strater Vipin Swarup George P. Tadda C. Wang John Yen

1. Be aware of the current situation. This aspect can also be called situation perception. Situation perception includes both situation recognition and identification. Situation identification can include identifying the type of attack (recognition is only recognizing that an attack is occurring), the source (who, what) of an attack, the target of an attack, etc. Situation perception is beyond ...

Journal: :Inf. Sci. 2013
Igino Corona Giorgio Giacinto Fabio Roli

Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructures. Their objective is to protect against attempts to violate defense mechanisms. Indeed, IDSs themselves are part of the computing infrastructure, and thus they may be attacked by the same adversaries they are designed to detect. This is a relevant aspect, especially in safety-critical environm...

1998
Mihir Bellare Anand Desai David Pointcheval Phillip Rogaway

We compare the relative strengths of popular notions of security for public-key encryption schemes. We consider the goals of privacy and non-malleability, each under chosen-plaintext attack and two kinds of chosen-ciphertext attack. For each of the resulting pairs of definitions we prove either an implication (every scheme meeting one notion must meet the other) or a separation (there is a sche...

1998
Joseph H. Silverman

RSA and Bell Labs [2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید