Sciweavers

CSREASAM
2010
13 years 9 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
COMCOM
2000
95views more  COMCOM 2000»
13 years 11 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
CHES
2008
Springer
146views Cryptology» more  CHES 2008»
14 years 1 months ago
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead...
Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhe...
GLOBECOM
2009
IEEE
14 years 3 months ago
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks
Abstract--We present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and countermeasures on MANETs. In particular, we focus on ...
André König, Daniel Seither, Ralf Stei...