Sciweavers

12183 search results - page 130 / 2437
» Computers under Attacks!
Sort
View
ASIACRYPT
2005
Springer
15 years 10 months ago
Adapting Density Attacks to Low-Weight Knapsacks
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption/decryption rate attracted considerable interest until it ...
Phong Q. Nguyen, Jacques Stern
IPPS
2003
IEEE
15 years 10 months ago
Global Communication Optimization for Tensor Contraction Expressions under Memory Constraints
The accurate modeling of the electronic structure of atoms and molecules involves computationally intensive tensor contractions involving large multi-dimensional arrays. The effi...
Daniel Cociorva, Xiaoyang Gao, Sandhya Krishnan, G...
BMVC
2002
15 years 7 months ago
Maximum Likelihood 3D Reconstruction from One or More Images under Geometric Constraints
We address the 3D reconstruction of scenes in which some planarity, collinearity, symmetry and other geometric properties are known
Etienne Grossmann, José Santos-Victor
INFOCOM
2009
IEEE
15 years 11 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 10 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor