Sciweavers

3451 search results - page 113 / 691
» Collaborative attack modeling
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 10 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
ICSM
2006
IEEE
14 years 4 months ago
Supporting Collaborative Development in an Open MDA Environment
The MDA approach aims to ease software maintenance faced with platform and business evolution. In this approach, main development artifacts, i.e. models, are defined with the Meta...
Prawee Sriplakich, Xavier Blanc, Marie-Pierre Gerv...
CCS
2007
ACM
14 years 4 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
INFOCOM
2010
IEEE
13 years 8 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 8 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert