Sciweavers

3451 search results - page 131 / 691
» Collaborative attack modeling
Sort
View
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 9 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
15 years 6 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
15 years 6 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
FUIN
2007
84views more  FUIN 2007»
15 years 2 months ago
Observation Based System Security
A formal model for description of passive and active timing attacks is presented, studied and compared with other security concepts. It is based on a timed process algebra and on a...
Damas P. Gruska
115
Voted
CHI
2002
ACM
16 years 2 months ago
Sketching annotations in a 3D web environment
Collaborative design review is an important part of architectural design work. The Space Pen system supports annotation and drawing on (and inside) 3D VRML/Java models using a reg...
Thomas Jung, Mark D. Gross, Ellen Yi-Luen Do