Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analy...
详细信息
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analyze the Davis Swick protocol and successfully prove the security of this protocol. Therefore, we can draw a conclusion that Running-Mode Analysis of three-principal cryptographic protocol is available.
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and contr...
详细信息
ISBN:
(纸本)0780378652
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and control the network virus epidemic situation. In this paper, a distributed broadband network virus precaution model is introduced. It analyzes the data in the network and discovers the coming virus epidemic situation in time. The quantitative analysis of broadband network virus epidemic situation is given, too. According to the result, we can collect the scale, the speed and the direction of the epidemic situation. Consequently, we can establish effect control policy to reduce harm.
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intr...
详细信息
ISBN:
(纸本)0780378652
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intrusion detection using honey pot). This approach solves the problems previously mentioned. As a component, the honey pot cooperates with IDS, which increases flexibility, configurability and security of IDS. We also present the definition of the honey pot, the description of this approach and a discussion of design and implementation issues.
We first give an extension of F[x]-lattice basis reduction algorithm to the polynomial ring R[x] where F is a field and R an arbitrary integral domain. So a new algorithm is presented for synthesizing minimum length l...
详细信息
暂无评论