Sciweavers

9719 search results - page 1673 / 1944
» Inference for Multiplicative Models
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
124
Voted
PAM
2010
Springer
15 years 11 months ago
Extracting Intra-domain Topology from mrinfo Probing
Active and passive measurements for topology discovery have known an impressive growth during the last decade. If a lot of work has been done regarding inter-domain topology discov...
Jean-Jacques Pansiot, Pascal Mérindol, Beno...
ISQED
2009
IEEE
126views Hardware» more  ISQED 2009»
15 years 11 months ago
Robust differential asynchronous nanoelectronic circuits
Abstract — Nanoelectronic design faces unprecedented reliability challenges and must achieve noise immunity and delay insensitiveness in the presence of prevalent defects and sig...
Bao Liu
IDTRUST
2009
ACM
15 years 11 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
SENSYS
2009
ACM
15 years 11 months ago
Explicit and precise rate control for wireless sensor networks
The state of the art congestion control algorithms for wireless sensor networks respond to coarse-grained feedback regarding available capacity in the network with an additive inc...
Avinash Sridharan, Bhaskar Krishnamachari
« Prev « First page 1673 / 1944 Last » Next »