Sciweavers

1085 search results - page 152 / 217
» A Timing Attack on RC5
Sort
View
EUROSYS
2008
ACM
15 years 7 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman

Book
2028views
16 years 5 months ago
TCL Wise - Guide to the TCL Programming Language
"this book is an introduction to the main ideas of the Tcl programming language: If you wish to learn a simple and powerful programming language, this book is for you. To read...
Salvatore Sanfilippo
ICIP
2009
IEEE
15 years 11 months ago
Fuzzy Perceptual Watermarking For Ownership Verification
- An adaptive watermarking method based on the human visual system model and the fuzzy inference system in wavelet domain is proposed. Fuzzy logic is used for data fusion and build...
Frederick C. Harris Jr., Mukesh Motwani
DAC
2001
ACM
15 years 10 months ago
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concu...
Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook K...
PERCOM
2007
ACM
15 years 9 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong