Sciweavers

923 search results - page 45 / 185
» Improved Slide Attacks
Sort
View
ICDE
2008
IEEE
192views Database» more  ICDE 2008»
16 years 1 months ago
Verifying and Mining Frequent Patterns from Large Windows over Data Streams
Mining frequent itemsets from data streams has proved to be very difficult because of computational complexity and the need for real-time response. In this paper, we introduce a no...
Barzan Mozafari, Hetal Thakkar, Carlo Zaniolo
BILDMED
2008
111views Algorithms» more  BILDMED 2008»
15 years 1 months ago
Simultaneous Model-Based Segmentation of Multiple Objects
Deformable models are used for the segmentation of objects in 3D images by adapting flexible meshes to image structures. The simultaneous segmentation of multiple objects often cau...
Astrid Franz, Robin Wolz, Tobias Klinder, Cristian...
ICRA
2010
IEEE
108views Robotics» more  ICRA 2010»
14 years 10 months ago
Planning pre-grasp manipulation for transport tasks
— Studies of human manipulation strategies suggest that pre-grasp object manipulation, such as rotation or sliding of the object to be grasped, can improve task performance by in...
Lillian Y. Chang, Siddhartha S. Srinivasa, Nancy S...
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
15 years 6 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 5 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin