Sciweavers

3451 search results - page 73 / 691
» Collaborative attack modeling
Sort
View
ISPE
2003
15 years 5 months ago
Negotiation algorithms for collaborative design settings
: Work to date on computational models of negotiation has focused almost exclusively on defining agreements consisting of one or a few independent issues. The negotiation involved ...
Mark Klein, Peyman Faratin, Hiroki Sayama, Yaneer ...
CHI
1997
ACM
15 years 8 months ago
Computer aided creativity and multicriteria optimization in design
Establishing that machines cannot automate creative design and that it is a difficult task for humans, I propose a computational model based on the human and machine complementari...
Denis Lalanne
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 10 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...
RAID
2004
Springer
15 years 10 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
CHES
2011
Springer
271views Cryptology» more  CHES 2011»
14 years 4 months ago
Modulus Fault Attacks against RSA-CRT Signatures
RSA-CRT fault attacks have been an active research area since their discovery by Boneh, DeMillo and Lipton in 1997. We present alternative key-recovery attacks on RSA-CRT signature...
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi...