Sciweavers

1353 search results - page 202 / 271
» Securing Current and Future Process Control Systems
Sort
View
128
Voted
CCS
2011
ACM
14 years 4 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
ISI
2005
Springer
15 years 9 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
PODC
2004
ACM
15 years 9 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
MOBICOM
2006
ACM
15 years 10 months ago
Sensor networks of freely drifting autonomous underwater explorers
With the increasing sophistication of both manned and unmanned systems for remote ocean exploration, a wealth of knowledge about heretofore-unknown oceanic processes has become av...
Jules Jaffe, Curt Schurgers
JETAI
2007
141views more  JETAI 2007»
15 years 3 months ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson