Sciweavers

3451 search results - page 73 / 691
» Collaborative attack modeling
Sort
View
ISPE
2003
13 years 10 months ago
Negotiation algorithms for collaborative design settings
: Work to date on computational models of negotiation has focused almost exclusively on defining agreements consisting of one or a few independent issues. The negotiation involved ...
Mark Klein, Peyman Faratin, Hiroki Sayama, Yaneer ...
CHI
1997
ACM
14 years 1 months ago
Computer aided creativity and multicriteria optimization in design
Establishing that machines cannot automate creative design and that it is a difficult task for humans, I propose a computational model based on the human and machine complementari...
Denis Lalanne
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 3 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...
RAID
2004
Springer
14 years 2 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
CHES
2011
Springer
271views Cryptology» more  CHES 2011»
12 years 9 months ago
Modulus Fault Attacks against RSA-CRT Signatures
RSA-CRT fault attacks have been an active research area since their discovery by Boneh, DeMillo and Lipton in 1997. We present alternative key-recovery attacks on RSA-CRT signature...
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi...