Sciweavers

3451 search results - page 155 / 691
» Collaborative attack modeling
Sort
View
COLCOM
2005
IEEE
15 years 8 months ago
Developing a framework for integrating prior problem solving and knowledge sharing histories of a group to predict future group
Using a combination of machine learning probabilistic tools, we have shown that some chemistry students fail to develop productive problem solving strategies through practice alon...
Ron Stevens, Amy Soller, Alessandra Giordani, Luca...
79
Voted
WWW
2007
ACM
16 years 3 months ago
Simple authentication for the web
Automated email-based password reestablishment (EBPR) is an efficient, cost-effective means to deal with forgotten passwords. In this technique, email providers authenticate users ...
Timothy W. van der Horst, Kent E. Seamons
148
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Alert Correlation through Triggering Events and Common Resources
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...
Dingbang Xu, Peng Ning
FC
2010
Springer
260views Cryptology» more  FC 2010»
15 years 3 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
126
Voted
ICISC
2009
125views Cryptology» more  ICISC 2009»
15 years 10 days ago
Power Analysis of Single-Rail Storage Elements as Used in MDPL
Several dual-rail logic styles make use of single-rail flip-flops for storing intermediate states. We show that single mask bits, as applied by various side-channel resistant logic...
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Ch...