Sciweavers

2763 search results - page 45 / 553
» The Dangerous 'All' in Specifications
Sort
View
EDCC
2008
Springer
13 years 9 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 9 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
BCSHCI
2009
13 years 9 months ago
"A little silly and empty-headed": older adults' understandings of social networking sites
This study suggests reasons for the absence of a growing proportion of the population, the so-called baby boomers, from the otherwise highly popular social networking sites. We ex...
Vilma Lehtinen, Jaana Näsänen, Risto Sar...
IEEECIT
2010
IEEE
13 years 6 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
DSVIS
1998
Springer
14 years 4 days ago
The Role of Verification in Interactive Systems Design
Abstract. In this paper we argue that using verification in interactive systems development is more than just checking whether the specification of the system has all the required ...
José Creissac Campos, Michael D. Harrison