Sciweavers

5578 search results - page 3 / 1116
» Base Class Injection
Sort
View
CHES
2004
Springer
170views Cryptology» more  CHES 2004»
13 years 11 months ago
Concurrent Error Detection Schemes for Involution Ciphers
Because of the rapidly shrinking dimensions in VLSI, transient and permanent faults arise and will continue to occur in the near future in increasing numbers. Since cryptographic c...
Nikhil Joshi, Kaijie Wu, Ramesh Karri
FLOPS
2010
Springer
13 years 4 months ago
Proving Injectivity of Functions via Program Inversion in Term Rewriting
Injectivity is one of the important properties for functions while it is undecidable in general and decidable for linear treeless functions. In this paper, we show new sufficient c...
Naoki Nishida, Masahiko Sakai
COMPSAC
1997
IEEE
13 years 10 months ago
Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis
We have investigated a fault injection-based technique for undermining the ability of software components to produce undesirable outputs into the state of the system. Undesirable ...
Jeffrey M. Voas
ACS
2010
13 years 5 months ago
Essentiality and Injectivity
Essentiality is an important notion closely related to injectivity. Depending on a class M of morphisms of a category A, three different types of essentiality are considered in lit...
H. Barzegar, M. Mehdi Ebrahimi, Mojgan Mahmoudi
IEEEARES
2008
IEEE
14 years 5 days ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay