Sciweavers

3451 search results - page 66 / 691
» Collaborative attack modeling
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 9 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
APCCM
2006
13 years 10 months ago
Supporting virtual organisation alliances with relative workflows
Driven by the fast changing service demand-and-supply requirements, virtual organisation alliances are created to adapt highly dynamic B2B collaborations. However, the temporary p...
Xiaohui Zhao, Chengfei Liu, Yun Yang
ICWE
2010
Springer
13 years 7 months ago
Syncro - Concurrent Editing Library for Google Wave
Abstract. The web accelerated the way people collaborate globally distributed. With Google Wave, a rich and extensible real-time collaboration platform is becoming available to a l...
Michael Goderbauer, Markus Goetz, Alexander Gro&sz...
IPPS
2005
IEEE
14 years 2 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the di...
Vasilios A. Siris, Ilias Stavrakis
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
14 years 23 days ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...