Sciweavers

5722 search results - page 295 / 1145
» Security Function Interactions
Sort
View
144
Voted
EKNOW
2010
14 years 10 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
134
Voted
BMCBI
2005
118views more  BMCBI 2005»
15 years 3 months ago
Variation in structural location and amino acid conservation of functional sites in protein domain families
Background: The functional sites of a protein present important information for determining its cellular function and are fundamental in drug design. Accordingly, accurate methods...
Birgit Pils, Richard R. Copley, Jörg Schultz
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
15 years 9 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
PADS
2005
ACM
15 years 9 months ago
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of...
Michael Liljenstam, Jason Liu, David M. Nicol, You...
ASIACRYPT
2009
Springer
15 years 8 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal