Sciweavers

1809 search results - page 195 / 362
» On the Purpose of Object-Oriented Analysis
Sort
View
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
15 years 3 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...
ICDT
2010
ACM
172views Database» more  ICDT 2010»
15 years 3 months ago
k-jump strategy for preserving privacy in micro-data disclosure
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Wen Ming Liu, Lingyu Wang, Lei Zhang
DESRIST
2009
Springer
142views Education» more  DESRIST 2009»
15 years 3 months ago
Design alternatives for the evaluation of design science research artifacts
Within a consideration of cost effectiveness the evaluation of design science research artifacts is of major importance. In the past, a plenitude of approaches has been developed ...
Anne Cleven, Philipp Gubler, Kai M. Hüner
PSIVT
2009
Springer
105views Multimedia» more  PSIVT 2009»
15 years 3 months ago
A New Method for Moving Object Extraction and Tracking Based on the Exclusive Block Matching
Abstract. Robust object tracking is required by many vision applications, and it will be useful for the motion analysis of moving object if we can not only track the object, but al...
Zhu Li, Kenichi Yabuta, Hitoshi Kitazawa
WISA
2009
Springer
15 years 3 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar