Sciweavers

1730 search results - page 146 / 346
» Open Archiving for Open Research
Sort
View
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
15 years 11 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
ICHIT
2009
Springer
15 years 11 months ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
HICSS
2008
IEEE
95views Biometrics» more  HICSS 2008»
15 years 11 months ago
A Real-Options Approach to Modeling Investments in Competitive, Dynamic Retail Markets
The proliferation of retail outlets with nearly identical product offerings and similar costs due to market efficiency means that selecting an appropriate market to open a store i...
Baabak Ashuri, William B. Rouse, Douglas A. Bodner
ICDCSW
2008
IEEE
15 years 11 months ago
Manetkit: A Framework for MANET Routing Protocols
Research in MANETs has resulted in the development of numerous and diverse routing protocols. We argue in this paper that this diversity is inherent to the MANET domain and theref...
Rajiv Ramdhany, Geoff Coulson
ICPR
2008
IEEE
15 years 11 months ago
Multitask learning for EEG-based biometrics
Biometrics based on electroencephalogram (EEG) signals is an emerging research topic. Several recent results have shown its feasibility and potential for personal identification....
Shiliang Sun