Sciweavers

3451 search results - page 65 / 691
» Collaborative attack modeling
Sort
View
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 3 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
OOIS
1997
Springer
14 years 17 days ago
An Agent-Based Coordination Model on Workflow Databases
Workflow management, one of the important technologies for supporting collaborative work, requires database technologies like distributed data management or transaction management...
Takeo Kunishima, Kazumasa Yokota
IPM
2010
157views more  IPM 2010»
13 years 7 months ago
Personalization of tagging systems
Social media systems have encouraged end user participation in the Internet, for the purpose of storing and distributing Internet content, sharing opinions and maintaining relatio...
Jun Wang, Maarten Clements, Jie Yang, Arjen P. de ...
IWIA
2005
IEEE
14 years 2 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
ICNP
2002
IEEE
14 years 2 months ago
Attacking DDoS at the Source
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects an...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher