Sciweavers

3451 search results - page 13 / 691
» Collaborative attack modeling
Sort
View
ICALT
2006
IEEE
14 years 1 months ago
A Model for Interoperability in Computer Supported Collaborative Learning
Computer Supported Collaborative Learning activities involve combination of complex software tools that often need to interoperate in a wider context of learning. This paper propo...
Georgios Kahrimanis, Andreas Papasalouros, Nikolao...
DEXAW
1998
IEEE
118views Database» more  DEXAW 1998»
13 years 12 months ago
New Object Models for Seamless Transition across Heterogeneous Mobile Environments
In mobile collaborative applications, collaborators may move across heterogeneous environments. This paper proposes object models for seamless transition of collaborators across h...
Anjaneyulu Pasala, D. Janaki Ram
ISCAPDCS
2004
13 years 9 months ago
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
Stephen M. Specht, Ruby B. Lee
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 2 months ago
Cryptanalysis of Substitution Cipher Chaining Mode (SCC)
In this paper, we present an enhanced cryptanalysis of the Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC which uses AES with 128-bit key) was broken using 5 att...
Mohamed Abo El-Fotouh, Klaus Diepold
MATES
2004
Springer
14 years 1 months ago
Towards Models of Incomplete and Uncertain Knowledge of Collaborators' Internal Resources
Collaboration plays a critical role when a group is striving for goals which are difficult or impossible to achieve by an individual. Knowledge about collaborators’ contribution...
Christian Guttmann, Ingrid Zukerman