Sciweavers

499 search results - page 73 / 100
» A Study on Latent Vulnerabilities
Sort
View
84
Voted
IPPS
2009
IEEE
15 years 7 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
CBMS
2008
IEEE
15 years 7 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
93
Voted
INFOCOM
2008
IEEE
15 years 6 months ago
Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets
—The effectiveness of online feedback mechanisms for rating the performance of providers in electronic markets is vulnerable to the submission of dishonest ratings. In this paper...
Thanasis G. Papaioannou, George D. Stamoulis
BROADNETS
2007
IEEE
15 years 6 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
DSN
2007
IEEE
15 years 6 months ago
Robustness Testing of the Windows DDK
Modern computers interact with many kinds of external devices, which have lead to a state where device drivers (DD) account for a substantial part of the operating system (OS) cod...
Manuel Mendonça, Nuno Neves