Sciweavers

13593 search results - page 2629 / 2719
» Performance Analysis of MD5
Sort
View
127
Voted
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
15 years 2 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
CCS
2008
ACM
15 years 2 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
116
Voted
CCS
2008
ACM
15 years 2 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
102
Voted
CIKM
2008
Springer
15 years 2 months ago
Non-local evidence for expert finding
The task addressed in this paper, finding experts in an enterprise setting, has gained in importance and interest over the past few years. Commonly, this task is approached as an ...
Krisztian Balog, Maarten de Rijke
108
Voted
CIKM
2008
Springer
15 years 2 months ago
Joke retrieval: recognizing the same joke told differently
In a corpus of jokes, a human might judge two documents to be the "same joke" even if characters, locations, and other details are varied. A given joke could be retold w...
Lisa Friedland, James Allan
« Prev « First page 2629 / 2719 Last » Next »