Sciweavers

1085 search results - page 92 / 217
» A Timing Attack on RC5
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 3 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
GECCO
2003
Springer
133views Optimization» more  GECCO 2003»
15 years 3 months ago
Dynamic Strategies in a Real-Time Strategy Game
Abstract. Most modern real-time strategy computer games have a sophisticated but fixed ‘AI’ component that controls the computer’s actions. Once the user has learned how suc...
William Joseph Falke II, Peter Ross
ICDE
2007
IEEE
198views Database» more  ICDE 2007»
15 years 11 months ago
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing
Recent work has shown the necessity of considering an attacker's background knowledge when reasoning about privacy in data publishing. However, in practice, the data publishe...
David J. Martin, Daniel Kifer, Ashwin Machanavajjh...
PAM
2010
Springer
15 years 4 months ago
Web Timeouts and Their Implications
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
Zakaria Al-Qudah, Michael Rabinovich, Mark Allman
IH
2009
Springer
15 years 4 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak