Sciweavers

1627 search results - page 273 / 326
» High Security Smartcards
Sort
View
111
Voted
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
15 years 2 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 2 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
100
Voted
MASCOTS
2010
15 years 2 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...
SERVICES
2010
119views more  SERVICES 2010»
15 years 2 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
92
Voted
GCA
2007
15 years 2 months ago
Transparent File Protection in On-Demand Computing
On-Demand Computing fulfills the need of computing availability at limited hardware and software costs. Distributed systems of this kind typically store user files in a shared ...
Fabio Dellutri, Salvatore Di Blasi, Giuseppe F. It...