Sciweavers

1369 search results - page 122 / 274
» A Practical Implementation of the Timing Attack
Sort
View
FC
2000
Springer
127views Cryptology» more  FC 2000»
15 years 2 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
WINET
2010
179views more  WINET 2010»
14 years 9 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ECIS
2004
15 years 17 days ago
Customer relationship management (CRM) evaluation: diffusing crm benefits into business processes
Although CRM is one of the fastest growing management approaches being adopted across many organizations and particularly tourism and hospitality firms, the deployment of CRM appl...
Marianna Sigala
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 5 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
15 years 2 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui