Sciweavers

3116 search results - page 232 / 624
» Recovering
Sort
View
104
Voted
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
15 years 4 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
98
Voted
DSN
2004
IEEE
15 years 4 months ago
HOURS: Achieving DoS Resilience in an Open Service Hierarchy
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This pap...
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zh...
117
Voted
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
15 years 4 months ago
Power Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Pierre-Alain Fouque, Sébastien Kunz-Jacques...
86
Voted
EH
2004
IEEE
102views Hardware» more  EH 2004»
15 years 4 months ago
Circuit Self-Recovery Experiments in Extreme Environments
Temperature and radiation tolerant electronics, as well as long life survivability are key capabilities required for future NASA missions. Current approaches to electronics for ex...
Adrian Stoica, Didier Keymeulen, Tughrul Arslan, V...
FGR
2004
IEEE
112views Biometrics» more  FGR 2004»
15 years 4 months ago
Face Alignment Under Variable Illumination
This paper presents an approach to face alignment under variable illumination, an obstacle largely ignored in previous 2D alignment work. To account for illumination variation, ou...
Yuchi Huang, Stephen Lin, Stan Z. Li, Hanqing Lu, ...