Sciweavers

1019 search results - page 83 / 204
» Cryptographic Design Vulnerabilities
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
.NET Security: Lessons Learned and Missed from Java
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
CRITIS
2006
15 years 7 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
BMCBI
2006
108views more  BMCBI 2006»
15 years 4 months ago
A new pooling strategy for high-throughput screening: the Shifted Transversal Design
Background: In binary high-throughput screening projects where the goal is the identification of low-frequency events, beyond the obvious issue of efficiency, false positives and ...
Nicolas Thierry-Mieg
DAC
2006
ACM
16 years 5 months ago
FLAW: FPGA lifetime awareness
Aggressive scaling of technology has an adverse impact on the reliability of VLSI circuits. Apart from increasing transient error susceptibility, the circuits also become more vul...
Suresh Srinivasan, Prasanth Mangalagiri, Yuan Xie,...
CCS
2009
ACM
15 years 10 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh