Sciweavers

3451 search results - page 38 / 691
» Collaborative attack modeling
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Modelling of Pseudonymity under Probabilistic Linkability Attacks
—This paper contributes to the field of measuring (un)linkability in communication systems; a subproblem of privacy protection. We propose an attacker state model for attacks on...
Martin Neubauer
JNW
2008
118views more  JNW 2008»
13 years 7 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
JUCS
2008
143views more  JUCS 2008»
13 years 9 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
ICCCN
2008
IEEE
14 years 3 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
HICSS
2002
IEEE
172views Biometrics» more  HICSS 2002»
14 years 1 months ago
Collaborative Software Development: A Discussion of Problem Solving Models and Groupware Technologies
Teamwork is always challenging. Adding the complication of problem solving and software design only amplifies this challenge. The challenges of developing software as a team can b...
Joanna DeFranco-Tommarello, Fadi P. Deek