Sciweavers

3602 search results - page 239 / 721
» Isn't It About Time
Sort
View
CCS
2007
ACM
15 years 7 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
95
Voted
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
15 years 7 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
84
Voted
CONTEXT
2007
Springer
15 years 7 months ago
Multiuser Intelligent M-learning Environment
In this article we present the architecture of an m-learning (mobile-learning) environment using Bluetooth as communications technology. We also describe its practical implementati...
Angel Moreno, Melquiades Carbajo, Bonifacio Casta&...
124
Voted
DALT
2007
Springer
15 years 7 months ago
Composing High-Level Plans for Declarative Agent Programming
Abstract. Research on practical models of autonomous agents has largely focused on a procedural view of goal achievement. This allows for efficient implementations, but prevents an...
Felipe Rech Meneguzzi, Michael Luck
FOSSACS
2007
Springer
15 years 7 months ago
Polynomial Constraints for Sets with Cardinality Bounds
Abstract. Logics that can reason about sets and their cardinality bounds are useful in program analysis, program verification, databases, and knowledge bases. This paper presents ...
Bruno Marnette, Viktor Kuncak, Martin C. Rinard