Sciweavers

832 search results - page 90 / 167
» Effect of Malicious Synchronization
Sort
View
129
Voted
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 5 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
142
Voted
CEAS
2008
Springer
15 years 5 months ago
Filtering Email Spam in the Presence of Noisy User Feedback
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
D. Sculley, Gordon V. Cormack
133
Voted
COMPSAC
2008
IEEE
15 years 5 months ago
Avoiding Program Failures Through Safe Execution Perturbations
We present an online framework to capture and recover from program failures and prevent them from occurring in the future through safe execution perturbations. The perturbations a...
Sriraman Tallam, Chen Tian, Rajiv Gupta, Xiangyu Z...
118
Voted
DSOM
2008
Springer
15 years 5 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
128
Voted
AAAI
2006
15 years 5 months ago
Trust Representation and Aggregation in a Distributed Agent System
This paper considers a distributed system of software agents who cooperate in helping their users to find services, provided by different agents. The agents need to ensure that th...
Yonghong Wang, Munindar P. Singh