Sciweavers

2137 search results - page 186 / 428
» Proving Abstract Non-interference
Sort
View
132
Voted
CAAN
2007
Springer
15 years 9 months ago
Vertex Pursuit Games in Stochastic Network Models
Abstract. Random graphs with given expected degrees G(w) were introduced by Chung and Lu so as to extend the theory of classical G(n, p) random graphs to include random power law g...
Anthony Bonato, Pawel Pralat, Changping Wang
113
Voted
CCS
2007
ACM
15 years 9 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
15 years 9 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
100
Voted
CICLING
2007
Springer
15 years 9 months ago
The Non-associativity of Polarized Tree-Based Grammars
Abstract. Polarities are used to sanction grammar fragment combination in high level tree-based formalisms such as eXtenssible MetaGrammar (XMG) and polarized unification grammars...
Yael Cohen-Sygal, Shuly Wintner
102
Voted
COLT
2007
Springer
15 years 9 months ago
Strategies for Prediction Under Imperfect Monitoring
Abstract. We propose simple randomized strategies for sequential prediction under imperfect monitoring, that is, when the forecaster does not have access to the past outcomes but r...
Gábor Lugosi, Shie Mannor, Gilles Stoltz