Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Driven by the fast changing service demand-and-supply requirements, virtual organisation alliances are created to adapt highly dynamic B2B collaborations. However, the temporary p...
Abstract. The web accelerated the way people collaborate globally distributed. With Google Wave, a rich and extensible real-time collaboration platform is becoming available to a l...
Michael Goderbauer, Markus Goetz, Alexander Gro&sz...
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the di...
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...