Sciweavers

923 search results - page 138 / 185
» Improved Slide Attacks
Sort
View
ASM
2008
ASM
15 years 1 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach
BIOSURVEILLANCE
2008
Springer
15 years 1 months ago
A Temporal Extension of the Bayesian Aerosol Release Detector
Early detection of bio-terrorist attacks is an important problem in public health surveillance. In this paper, we focus on the detection and characterization of outdoor aerosol rel...
Xiaohui Kong, Garrick L. Wallstrom, William R. Hog...
DSD
2008
IEEE
108views Hardware» more  DSD 2008»
15 years 1 months ago
Reducing Leakage through Filter Cache
We evaluate the leakage reduction for both instruction and data cache in presence of drowsy or decay techniques. We discovered that a filter cache, traditionally used for reducing...
Roberto Giorgi, Paolo Bennati
BNCOD
2004
65views Database» more  BNCOD 2004»
15 years 1 months ago
Reducing Damage Assessment Latency in Survivable Databases
Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
NETWORKING
2004
15 years 1 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar