Sciweavers

712 search results - page 92 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
A Framework for Understanding Botnets
Botnets have become a severe threat to the cyberspace. However, existing studies are typically conducted in an ad hoc fashion, by demonstrating specific analysis on captured bot ...
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
15 years 4 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
SP
2009
IEEE
15 years 4 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
SAFECOMP
2009
Springer
15 years 4 months ago
Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Fa
The advanced electric power grid is a cyber-physical system comprised of physical components such as transmission lines and generators and a network of embedded systems deployed fo...
Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin
IEEEARES
2008
IEEE
15 years 4 months ago
Reliability Analysis using Graphical Duration Models
Reliability analysis has become an integral part of system design and operating. This is especially true for systems performing critical tasks such as mass transportation systems....
Roland Donat, Laurent Bouillaut, Patrice Aknin, Ph...