Sciweavers

634 search results - page 28 / 127
» Groundwork for Weak Analysis
Sort
View
91
Voted
FLAIRS
2004
15 years 3 months ago
In-Depth Analysis of Similarity Knowledge and Metric Contributions to Recommender Performance
Initial successes in the area of recommender systems have led to considerable early optimism. However as a research community, we are still in the early days of our understanding ...
Derry O'Sullivan, Barry Smyth, David C. Wilson
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
15 years 3 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
ECCC
2006
97views more  ECCC 2006»
15 years 1 months ago
Runtime Analysis of a Simple Ant Colony Optimization Algorithm
Ant Colony Optimization (ACO) has become quite popular in recent years. In contrast to many successful applications, the theoretical foundation of this randomized search heuristic...
Frank Neumann, Carsten Witt
ESORICS
2009
Springer
16 years 2 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
118
Voted
PERCOM
2005
ACM
16 years 1 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong