Sciweavers

199 search results - page 40 / 40
» A system for a new two-dimensional code: Secure 2D code
Sort
View
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 6 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
PLDI
2003
ACM
13 years 10 months ago
CCured in the real world
CCured is a program transformation system that adds memory safety guarantees to C programs by verifying statically that memory errors cannot occur and by inserting run-time checks...
Jeremy Condit, Matthew Harren, Scott McPeak, Georg...
COMCOM
2006
121views more  COMCOM 2006»
13 years 5 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
NETWORK
2008
150views more  NETWORK 2008»
13 years 5 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu