Sciweavers

549 search results - page 61 / 110
» Belief-Based Risk Analysis
Sort
View
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 6 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
PAKDD
2007
ACM
137views Data Mining» more  PAKDD 2007»
15 years 6 months ago
Contrast Set Mining Through Subgroup Discovery Applied to Brain Ischaemina Data
Abstract. Contrast set mining aims at finding differences between different groups. This paper shows that a contrast set mining task can be transformed to a subgroup discovery ta...
Petra Kralj, Nada Lavrac, Dragan Gamberger, Antoni...
ICIAR
2010
Springer
15 years 4 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
SEC
2007
15 years 1 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser
JOI
2007
52views more  JOI 2007»
14 years 11 months ago
The h-index: Advantages, limitations and its relation with other bibliometric indicators at the micro level
The relationship of the h-index with other bibliometric indicators at the micro level is analysed for Spanish CSIC scientists in Natural Resources, using publications downloaded f...
Rodrigo Costas, María Bordons