Sciweavers

634 search results - page 30 / 127
» Groundwork for Weak Analysis
Sort
View
INFOCOM
1996
IEEE
15 years 6 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
FDTC
2008
Springer
144views Cryptology» more  FDTC 2008»
15 years 3 months ago
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems
The adaptive and active nature of fault based sidechannel attacks along with the large arsenal of fault injection methods complicates the design of effective countermeasures. To o...
Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky
CAISE
2008
Springer
15 years 3 months ago
Computer-Aided Method Engineering: An Analysis of Existing Environments
Analogous to Computer-Aided Software Engineering (CASE), which aims to facilitate Software Engineering through specialized tools, ComputerAided Method Engineering (CAME) strives to...
Ali Niknafs, Raman Ramsin
FAC
2007
122views more  FAC 2007»
15 years 1 months ago
Formal techniques for performance analysis: blending SAN and PEPA
Abstract. In this paper we consider two performance modelling techniques from the perspectives of model construction, generation of an underlying continuous time Markov process, an...
Jane Hillston, Leïla Kloul
USS
2010
14 years 11 months ago
An Analysis of Private Browsing Modes in Modern Browsers
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey i...
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, D...