Sciweavers

12183 search results - page 148 / 2437
» Computers under Attacks!
Sort
View
135
Voted
IPTPS
2005
Springer
15 years 10 months ago
A Taxonomy of Rational Attacks
Abstract— For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neith...
Seth James Nielson, Scott A. Crosby, Dan S. Wallac...
131
Voted
ICCSA
2004
Springer
15 years 10 months ago
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moo...
ERSHOV
2006
Springer
15 years 8 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska
157
Voted
DIMVA
2011
14 years 8 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner
EMMCVPR
2009
Springer
15 years 11 months ago
Image Registration under Varying Illumination: Hyper-Demons Algorithm
Abstract. The goal of this paper is to present a novel recipe for deformable image registration under varying illumination, as a natural extension of the demons algorithm. This gen...
Mehran Ebrahimi, Anne L. Martel