Sciweavers

1369 search results - page 226 / 274
» A Practical Implementation of the Timing Attack
Sort
View
80
Voted
ALMOB
2006
80views more  ALMOB 2006»
14 years 11 months ago
Effective p-value computations using Finite Markov Chain Imbedding (FMCI): application to local score and to pattern statistics
The technique of Finite Markov Chain Imbedding (FMCI) is a classical approach to complex combinatorial problems related to sequences. In order to get efficient algorithms, it is k...
Grégory Nuel
CORR
2006
Springer
114views Education» more  CORR 2006»
14 years 11 months ago
A New Cryptosystem Based On Hidden Order Groups
Let G1 be a cyclic multiplicative group of order n. It is known that the Diffie-Hellman problem is random self-reducible in G1 with respect to a fixed generator g if (n) is known....
Amitabh Saxena, Ben Soh
77
Voted
IIE
2008
149views more  IIE 2008»
14 years 11 months ago
Information Technologies for Biology Education: Computerized Electrophysiology of Plant Cells
Abstract. Biology has moved from a bench-based discipline to a bioinformational science in modern times but application of computational and analytical methods of informatics in it...
Vilma Kisnieriene, Kastytis Beitas, Vidmantas Saka...
IJLT
2008
184views more  IJLT 2008»
14 years 11 months ago
Ad hoc transient communities: towards fostering knowledge sharing in learning networks
: To enhance users' social embedding within learning networks, we propose to establish ad hoc transient communities. These communities serve a particular goal, exist for a lim...
Adriana J. Berlanga, Peter B. Sloep, Liesbeth Kest...
CORR
2007
Springer
147views Education» more  CORR 2007»
14 years 11 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal