Sciweavers

551 search results - page 27 / 111
» Preventing existence
Sort
View
74
Voted
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 3 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
76
Voted
CCIA
2005
Springer
15 years 3 months ago
A CBR System for Autonomous Robot Navigation
In this paper we propose the use of case-based reasoning techniques to improve the navigation of an autonomous robot in unknown semistructured environments. At the moment the curre...
Raquel Ros, Ramon López de Mántaras,...
91
Voted
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
15 years 3 months ago
Side-Channel Leakage of Masked CMOS Gates
There are many articles and patents on the masking of logic gates. However, the existing publications assume that a masked logic gate switches its output no more than once per cloc...
Stefan Mangard, Thomas Popp, Berndt M. Gammel
100
Voted
NETGAMES
2004
ACM
15 years 2 months ago
A cheat controlled protocol for centralized online multiplayer games
Ordering of command messages from the clients at the game servers is an important issue that impacts fairness, response times, and smoothness of the game play. Recently, protocols...
Bei Di Chen, Muthucumaru Maheswaran
72
Voted
PDP
2010
IEEE
15 years 2 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen