Sciweavers

3451 search results - page 58 / 691
» Collaborative attack modeling
Sort
View
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
14 years 9 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
USS
2008
13 years 11 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
MODELS
2009
Springer
14 years 1 months ago
SLIM - A Lightweight Environment for Synchronous Collaborative Modeling
Abstract. UML diagrams have become the de-facto standard for the visual modeling of software systems. The creation and discussion of these diagrams is a critical factor impacting t...
Christian Thum, Michael Schwind, Martin Schader
CRIWG
2008
13 years 10 months ago
Risk Assessment in Healthcare Collaborative Settings: A Case Study Using SHELL
This paper describes a case study addressing risk assessment in a hospital unit. The objective was to analyse the impact on collaborative work after the unit changed their installa...
Pedro Antunes, Rogerio Bandeira, Luís Carri...
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...