Sciweavers

1085 search results - page 138 / 217
» A Timing Attack on RC5
Sort
View
ICCS
2004
Springer
15 years 3 months ago
Data Driven Design Optimization Methodology Development and Application
The Data Driven Design Optimization Methodology (DDDOM) is a Dynamic Data Driven Application System (DDDAS) developed for engineering design optimization. The DDDOM synergizes expe...
H. Zhao, D. Knight, E. Taskinoglu, V. Jovanovic
CONCUR
1999
Springer
15 years 2 months ago
Validating Firewalls in Mobile Ambients
Abstract. The ambient calculus is a calculus of computation that allows active processes (mobile ambients) to move between sites. A firewall is said to be protective whenever it d...
Flemming Nielson, Hanne Riis Nielson, René ...
ACSAC
1998
IEEE
15 years 2 months ago
Electronic Submission Protocol Based on Temporal Accountability
This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, an...
Michiharu Kudo
PKC
1999
Springer
96views Cryptology» more  PKC 1999»
15 years 2 months ago
How to Copyright a Function?
This paper introduces a method for tracking different copies of functionally equivalent algorithms containing identification marks known to the attacker. Unlike all previous solu...
David Naccache, Adi Shamir, Julien P. Stern
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 1 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani