Sciweavers

511 search results - page 48 / 103
» Practical Differential Profiling
Sort
View
97
Voted
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
15 years 2 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
82
Voted
DAGM
2004
Springer
15 years 1 months ago
Accurate and Efficient Approximation of the Continuous Gaussian Scale-Space
Abstract. The Gaussian scale-space is a standard tool in image analysis. While continuous in theory, it is generally realized with fixed regular grids in practice. This prevents th...
Ullrich Köthe
MICCAI
2003
Springer
15 years 11 months ago
Determination of the Mechanical Properties of Soft Human Tissues through Aspiration Experiments
Mechanical models for soft human organs are necessary for a variety of medical applications, such as surgical planning, virtual reality surgery simulators, and for diagnostic purpo...
Alessandro Nava, Edoardo Mazza, Frederic Kleinerma...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
15 years 10 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
RECOMB
2005
Springer
15 years 3 months ago
Examination of the tRNA Adaptation Index as a Predictor of Protein Expression Levels
Phenotypic differences between closely-related species may arise from differential expression regimes, rather than different gene complements. Knowledge of cellular protein levels ...
Orna Man, Joel L. Sussman, Yitzhak Pilpel