Sciweavers

172 search results - page 17 / 35
» Key agreement from weak bit agreement
Sort
View
JOC
2011
94views more  JOC 2011»
14 years 15 days ago
Mutual Information Analysis: a Comprehensive Study
Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and kno...
Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff,...
ECMDAFA
2006
Springer
137views Hardware» more  ECMDAFA 2006»
15 years 1 months ago
A Canonical Scheme for Model Composition
There is little agreement on terminology in model composition, and even less on key characteristics of a model composition solution. We present three composition frameworks: the At...
Jean Bézivin, Salim Bouzitouna, Marcos Dido...
ACMICEC
2004
ACM
107views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
Reasoning about commitments in multiple concurrent negotiations
Automated negotiation by software agents is a key enabling technology for agent mediated e-commerce. To this end, this paper considers an important class of such negotiations — ...
Thuc Duong Nguyen, Nicholas R. Jennings
IJCIS
2006
80views more  IJCIS 2006»
14 years 9 months ago
A Layered Framework for Connecting Client Objectives and Resource Capabilities
entifies three levels of abstraction for resource requirements a service provider needs to manage, detailed specification of raw resources, virtualization of heterogeneous resource...
Asit Dan, Kavitha Ranganathan, Catalin Dumitrescu,...
CSE
2009
IEEE
15 years 2 months ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme