We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
It is well-accepted that learnability is an important aspect of usability, yet there is little agreement as to how learnability should be defined, measured, and evaluated. In this...
Tovi Grossman, George W. Fitzmaurice, Ramtin Attar
Embedded systems must be cost-effective. This imposes strict requirements on the resource consumption of their applications. It is therefore desirable to be able to determine the ...
Several empirical studies have been carried out with college students as subjects in the last few years. Researchers often use these studies to pilot experiments before they are c...
Jeffrey Carver, Maria Letizia Jaccheri, Sandro Mor...
Converting a scanned document to a binary format (black and white) is a key step in the digitization process. While many existing binarization algorithms operate robustly for well...