Breakthrough for Brake Design
... - ances can be relaxed without compromis- ing the design. VALIDATION The new simulation approach proved ... - ances can be relaxed without compromis- ing the design. VALIDATION The new simulation approach proved ...
https://people.inf.ethz.ch/rsasse/pub/ARPKI-journal.pdf
... against a strong adversary capable of compromis- ing n � 1 entities at any time, where n C 3 is a system ... compromising a log server’s key suffices to launch an attack in SK, CT, CIRT, and DTKI, AKI requires compromis ... against a strong adversary capable of compromis- ing n 1 entities at any time, where n C 3 is a system ... compromising a log server’s key suffices to launch an attack in SK, CT, CIRT, and DTKI, AKI requires compromis ...
https://nsg.ee.ethz.ch/fileadmin/user_upload/publications/Securing_...
... , which are stealthier and effective at compromis- ing Internet applications. The Tor Network Tor is the ... , which are stealthier and effective at compromis- ing Internet applications. The Tor Network Tor is the ...
http://people.inf.ethz.ch/basin/pubs/arpki-ccs14.pdf
... against a strong adversary capable of compromis- ing n − 1 entities at any time, where n ≥ 3 is a system ... against a strong adversary capable of compromis- ing n − 1 entities at any time, where n ≥ 3 is a system ...
https://people.inf.ethz.ch/rsasse/pub/ARPKI.pdf
... against a strong adversary capable of compromis- ing n − 1 entities at any time, where n ≥ 3 is a system ... against a strong adversary capable of compromis- ing n − 1 entities at any time, where n ≥ 3 is a system ...
Fast and strongly-consistent per-item resilience in key-value stores
... level of resilience on a KV pair basis while still maintaining overall consistency and without compromis ... level of resilience on a KV pair basis while still maintaining overall consistency and without compromis ...
https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/...
https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/spot/secpos_JSAC.pdf, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUA...
chapter-security.dvi
chapter-security.dvi, http://people.inf.ethz.ch/basin/pubs/security-modelchecking.pdf, chapter-security.dvi David Basin, Cas Cremers, Catherine Meadows Model Checking Security Protocols May 19, 20...
Fallstudie EWR
Fallstudie EWR, https://ethz.ch/content/dam/ethz/special-interest/gess/cis/international-relations-dam/News_AboutUs_PhDProgram/Documents/dissertation%20peter%20moser%20unizh.pdf, Fallstudie EWR Sc...
https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/cent...
https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Multilateralism_in_Transition.pdf, CSS STUDY Authors: Thomas Greminger, Fabian Grass, Anna Hess Sa...