Sciweavers

3451 search results - page 14 / 691
» Collaborative attack modeling
Sort
View
IFIP
2009
Springer
13 years 5 months ago
A Collaboration Pattern Model for Virtual Organisations
Collaboration, either inter or intra-organization is a critical business function that demands skills and knowledge spanning a wide range of domains including social, business and ...
Nikos Papageorgiou, Giannis Verginadis, Dimitris A...
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
14 years 6 hour ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
PROCEDIA
2010
153views more  PROCEDIA 2010»
13 years 6 months ago
Conceptual framework for dynamic trust monitoring and prediction
The dynamic and collaborative nature of mobile and sensor networks raises the issue of how connected mobile devices can be trusted. Despite the existing security paradigms such as...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
DSN
2007
IEEE
14 years 2 months ago
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks
Attacks exploiting race conditions have been considered rare and “low risk”. However, the increasing popularity of multiprocessors has changed this situation: instead of waiti...
Jinpeng Wei, Calton Pu
HICSS
2009
IEEE
662views Biometrics» more  HICSS 2009»
14 years 2 months ago
Modeling Collaborative Behavior: Foundations for Collaboration Technologies
Can models of collaboration serve as a foundation for development of collaborative technologies in much the same way that engineers use models when developing complex systems? We ...
Steven E. Poltrock, Mark Handel