Sciweavers

1518 search results - page 155 / 304
» Cryptographic Test Correction
Sort
View
107
Voted
IACR
2011
86views more  IACR 2011»
14 years 22 days ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
PODC
2012
ACM
13 years 3 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
112
Voted
SENSYS
2009
ACM
15 years 8 months ago
Run time assurance of application-level requirements in wireless sensor networks
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John...
109
Voted
JCB
2008
94views more  JCB 2008»
15 years 1 months ago
Prioritize and Select SNPs for Association Studies with Multi-Stage Designs
Large-scale whole genome association studies are increasingly common, due in large part to recent advances in genotyping technology. With this change in paradigm for genetic studi...
Jing Li
102
Voted
ICCV
2001
IEEE
16 years 3 months ago
Confidence and Curvature Estimation of Curvilinear Structures in 3-D
In this paper we present a new method for estimating confidence and curvature of 3-D curvilinear structures. The gradient structure tensor (GST) models shift-invariance. The eigen...
Peter Bakker, Lucas J. van Vliet, Piet W. Verbeek