Sciweavers

12183 search results - page 172 / 2437
» Computers under Attacks!
Sort
View
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 10 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
RAID
2001
Springer
15 years 9 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
SMA
2003
ACM
123views Solid Modeling» more  SMA 2003»
15 years 10 months ago
Collision prediction for polyhedra under screw motions
The prediction of collisions amongst N rigid objects may be reduced to a series of computations of the time to first contact for all pairs of objects. Simple enclosing bounds and...
ByungMoon Kim, Jarek Rossignac
NAS
2009
IEEE
15 years 12 months ago
Reliable Lightpath Routing in Optical Mesh Networks under Multiple Link Failures
- In this work, we study the problem of maximizing lightpath reliability in optical mesh networks against simultaneous failures of multiple fiber links without using protection sch...
Shengli Yuan
ICPR
2008
IEEE
15 years 11 months ago
Semi-supervised feature selection under logistic I-RELIEF framework
We consider feature selection in the semi-supervised learning setting. This problem is rarely addressed in the literature. We propose a new algorithm as a natural extension of the...
Yubo Cheng, Yunpeng Cai, Yijun Sun, Jian Li