Sciweavers

518 search results - page 31 / 104
» Abstract Interpretation-Based Protection
Sort
View
CCS
2007
ACM
15 years 8 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
DEXA
2007
Springer
140views Database» more  DEXA 2007»
15 years 8 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
ISI
2007
Springer
15 years 8 months ago
Architecture for an Automatic Customized Warning System
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasu...
90
Voted
ICCSA
2005
Springer
15 years 7 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
PAKDD
2005
ACM
115views Data Mining» more  PAKDD 2005»
15 years 7 months ago
Performance Measurements for Privacy Preserving Data Mining
Abstract. This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy ...
Nan Zhang 0004, Wei Zhao, Jianer Chen