Sciweavers

215 search results - page 43 / 43
» Quantum computers that can be simulated classically in polyn...
Sort
View
ICNP
2006
IEEE
13 years 11 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
13 years 11 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...
ICDCS
2010
IEEE
13 years 9 months ago
B-SUB: A Practical Bloom-Filter-Based Publish-Subscribe System for Human Networks
—The adoption of portable wireless devices is rapidly rising. The demand for efficient communication protocols amongst these devices is pressing. In this paper, we present a con...
Yaxiong Zhao, Jie Wu
IJOE
2011
118views more  IJOE 2011»
13 years 8 days ago
Three Online Neutron Beam Experiments Based on the iLab Shared Architecture
- Students at MIT have traditionally executed certain experiments in the containment building of the MIT nuclear reactor as part of courses in Nuclear Engineering and the third yea...
Kimberly DeLong, Judson V. Harward, Philip H. Bail...
ANCS
2005
ACM
13 years 11 months ago
Fast and scalable pattern matching for content filtering
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packe...
Sarang Dharmapurikar, John W. Lockwood