Sciweavers

3451 search results - page 155 / 691
» Collaborative attack modeling
Sort
View
194
Voted
COLCOM
2005
IEEE
15 years 10 months ago
Developing a framework for integrating prior problem solving and knowledge sharing histories of a group to predict future group
Using a combination of machine learning probabilistic tools, we have shown that some chemistry students fail to develop productive problem solving strategies through practice alon...
Ron Stevens, Amy Soller, Alessandra Giordani, Luca...
WWW
2007
ACM
16 years 5 months ago
Simple authentication for the web
Automated email-based password reestablishment (EBPR) is an efficient, cost-effective means to deal with forgotten passwords. In this technique, email providers authenticate users ...
Timothy W. van der Horst, Kent E. Seamons
ACSAC
2004
IEEE
15 years 8 months ago
Alert Correlation through Triggering Events and Common Resources
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...
Dingbang Xu, Peng Ning
FC
2010
Springer
260views Cryptology» more  FC 2010»
15 years 6 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
ICISC
2009
125views Cryptology» more  ICISC 2009»
15 years 2 months ago
Power Analysis of Single-Rail Storage Elements as Used in MDPL
Several dual-rail logic styles make use of single-rail flip-flops for storing intermediate states. We show that single mask bits, as applied by various side-channel resistant logic...
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Ch...