Sciweavers

362 search results - page 12 / 73
» Extending the Resynchronization Attack
Sort
View
DIGRA
2003
Springer
14 years 18 days ago
The attack of the backstories (and why they won't win)
This essay adopts a formal model of play as semiosis [18] to explore the often dysfunctional role of backstories within computer game design and play. Within this model, backstori...
David Myers
SSDBM
2011
IEEE
234views Database» more  SSDBM 2011»
12 years 11 months ago
Privacy Preserving Group Linkage
The problem of privacy-preserving record linkage is to find the intersection of records from two parties, while not revealing any private records to each other. Recently, group li...
Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng ...
DBSEC
2008
152views Database» more  DBSEC 2008»
13 years 8 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 7 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
HPCA
2007
IEEE
14 years 7 months ago
Extending Multicore Architectures to Exploit Hybrid Parallelism in Single-thread Applications
Chip multiprocessors with multiple simpler cores are gaining popularity because they have the potential to drive future performance gains without exacerbating the problems of powe...
Hongtao Zhong, Steven A. Lieberman, Scott A. Mahlk...