搜索结果: 1-15 共查到“Logs”相关记录26条 . 查询时间(0.094 秒)
Forward Integrity and Crash Recovery for Secure Logs
cryptographic protocols computer systems
2019/5/21
Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering ...
Transparency Logs via Append-only Authenticated Dictionaries
implementation key management public-key cryptography
2018/8/6
Transparency logs allow users to audit a potentially malicious service, paving the way towards a more accountable Internet. For example, Certificate Transparency (CT) enables domain owners to audit Ce...
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
discrete logarithm problem diffie-hellman small subgroup attack
2016/12/8
Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they are presented with are trustworthy, i.e., the parame...
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful supercomputers: using logs r...
Log files are the primary source of information when the
past operation of a computing system needs to be determined. Keeping
correct and accurate log files is important for after-the-fact forensics...
Efficient Record-Level Keyless Signatures for Audit Logs
applied security secure logging keyless signatures
2016/1/8
We propose a log signing scheme that enables (a) verification of the integrity of the whole log, and
(b) presentation of any record, along with a compact proof that the record has not been altered si...
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
public-key cryptography elliptic curve
2016/1/6
Using the Pohlig–Hellman algorithm, den Boer reduced the discrete logarithm problem
to the Diffie–Hellman problem in groups of an order whose prime factors were each
one plus a smooth number. This r...
Experiments in Encrypted and Searchable Network Audit Logs
network telemetry identity based encryption audit log privacy
2016/1/5
We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. E...
Coniform-shape tool for splitting of wooden logs
fracture mechanics wedge splitting test fracture energy
2015/5/18
The article deals with design of a coniform tool with rotary motion for splitting of logs. The tool is proposed using a fracture mechanics theory. The approach of energy balance during crack growth in...
Effect of insecticide-treated trap logs and lure traps for Ips typographus (Coleoptera: Curculionidae) management on nontarget arthropods catching in Norway spruce stands
tripod trap logs pheromone trap
2015/5/5
The numbers of nontarget arthropods captured by Theysohn pheromone traps (TPTs) and insecticidetreated tripod trap logs (TRIPODs) were compared; both kinds of traps were baited with pheromone lures Ph...
Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince
Collision-based attacks discrete-log
2014/3/6
In this paper, we investigate the multi-user setting both in public-key and in secret-key cryptanalytic applications. In this setting, the adversary tries to recover keys of many users in parallel mor...
Integration of Well Logs and Seismic Data for Prospects Evaluation of an X Field, Onshore Niger Delta, Nigeria
Seismic Data Well Logs Prospect Niger Delta
2013/3/11
Hydrocarbon reservoir beds have been delineated using direct hydrocarbon indicator on seismic sections as well as well logs data in X field, Onshore Niger Delta. The research methodology involved hori...
Total Organic Carbon Enrichment and Source Rock Evaluation of the Lower Miocene Rocks Based on Well Logs: October Oil Field, Gulf of Suez-Egypt
Total Organic Carbon Source Rocks Well Logs October Oil Field Gulf of Suez
2013/3/11
October oil field is one of the largest hydrocarbon-bearing fields which produces oil from the sand section of the Lower Miocene Asl Formation. Two marl (Asl Marl) and shale (Hawara Formation) section...
EVALUATION OF AQUIFER TRASMISSIVITY IN KARST USING GEOPHYSICAL WELL LOGS
AQUIFER TRASMISSIVITY GEOPHYSICAL KARST
2009/10/19
A hydrogeophysical model is presented for the South Havana Basin, Cuba, based on the processing of geophysical well logs, together with transmissivity data obtained from aquifer tests. The model provi...
Comparison of Chemical Compositions of Shiitake(Lentinus edodes(Berk.)Sing)Cultivated on Logs and Sawdust Substrate
shiitake log sawdust substrate proximate composition
2009/5/31
Sawdust and logs for shiitake cultivation were prepared from the same wood. Shiitake mushrooms were cultivated on the logs and on the sawdust substrate using the same mushroom seed. The proximate comp...