Sciweavers

1369 search results - page 93 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ICANNGA
2009
Springer
133views Algorithms» more  ICANNGA 2009»
15 years 5 months ago
Visualizing Time Series State Changes with Prototype Based Clustering
Modern process and condition monitoring systems produce a huge amount of data which is hard to analyze manually. Previous analyzing techniques disregard time information and concen...
Markus Pylvänen, Sami Äyrämö, ...
DCC
2002
IEEE
15 years 10 months ago
Bit Allocation in Sub-linear Time and the Multiple-Choice Knapsack Problem
We show that the problem of optimal bit allocation among a set of independent discrete quantizers given a budget constraint is equivalent to the multiple choice knapsack problem (...
Alexander E. Mohr
ICIAP
1999
ACM
15 years 3 months ago
Cellular Automata Based Optical Flow Computation for "Just-in-Time" Applications
Real-world tasks often require real-time performances. However, in many practical cases, “just in time” responses are sufficient. This means that a system should be efficien...
Giovanni Adorni, Stefano Cagnoni, Monica Mordonini
94
Voted
NETWORKING
2007
15 years 15 days ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 4 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...