Sciweavers

483 search results - page 54 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
126
Voted
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 9 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
249
Voted
SACMAT
2011
ACM
14 years 6 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
135
Voted
WOA
2001
15 years 4 months ago
Object Oriented Mapping for HTML Documents
Emerging distributed technologies aim to provide simple and powerful tools for web services design and implementation. Main vendors provide modern frameworks so that a good coordi...
Francesco Garelli, Carlo Ferrari
130
Voted
AAAI
2010
15 years 5 months ago
Security Games with Arbitrary Schedules: A Branch and Price Approach
Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms use...
Manish Jain, Erim Kardes, Christopher Kiekintveld,...
CHI
2008
ACM
16 years 3 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...