Sciweavers

258 search results - page 11 / 52
» Faults' context matters
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
14 years 11 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
ECML
1993
Springer
15 years 5 months ago
Exploiting Context When Learning to Classify
This paper addresses the problem of classifying observations when features are context-sensitive, specifically when the testing set involves a context that is different from the t...
Peter D. Turney
PERCOM
2006
ACM
16 years 1 months ago
SmartContacts: A Large Scale Social Context Service Discovery System
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. SmartContacts provides a solution to this problem by empowering the caller to...
Yong Liu, Kay Connelly
FMSP
2000
ACM
152views Formal Methods» more  FMSP 2000»
15 years 6 months ago
Fault origin adjudication
When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
BIRTHDAY
2012
Springer
13 years 9 months ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...