Sciweavers

1369 search results - page 146 / 274
» A Practical Implementation of the Timing Attack
Sort
View
INTERFACES
2008
77views more  INTERFACES 2008»
14 years 11 months ago
Showcase Scheduling at Fred Astaire East Side Dance Studio
: The ballroom dancing showcases at Fred Astaire East Side Dance Studio in Manhattan are held at least twice a year and provide the students with an environment for socializing, pr...
Miguel A. Lejeune, Nevena Yakova
EUC
2007
Springer
15 years 3 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
IJNSEC
2006
78views more  IJNSEC 2006»
14 years 11 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
DOA
2001
94views more  DOA 2001»
15 years 18 days ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
CHES
2011
Springer
276views Cryptology» more  CHES 2011»
13 years 11 months ago
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control
Abstract. The paper presents a novel and efficient method to generate true random numbers on FPGAs by inducing metastability in bi-stable circuit elements, e.g. flip-flops. Meta...
Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Dev...