Sciweavers

3116 search results - page 356 / 624
» Recovering
Sort
View
137
Voted
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 12 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
WCRE
2009
IEEE
15 years 12 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 12 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
ICTAI
2009
IEEE
15 years 11 months ago
Change Tracer: Tracking Changes in Web Ontologies
Knowledge constantly grows in scientific discourse and is revised over time by domain experts. The body of knowledge will get structured and refined as the Communities of Practice...
Asad Masood Khattak, Khalid Latif, Manhyung Han, S...
INFOCOM
2009
IEEE
15 years 11 months ago
Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks
—We present the Flash flooding protocol for rapid network flooding in wireless sensor networks. Traditional flooding protocols can be very slow because of neighborhood content...
Jiakang Lu, Kamin Whitehouse