Sciweavers

16218 search results - page 3182 / 3244
» Standards
Sort
View
ACSAC
2010
IEEE
15 years 2 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou
ASIACRYPT
2010
Springer
15 years 2 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
ASIACRYPT
2010
Springer
15 years 2 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
BMVC
2010
15 years 2 months ago
Improved Anatomical Landmark Localization in Medical Images Using Dense Matching of Graphical Models
We propose a method for reliably and accurately identifying anatomical landmarks in 3D CT volumes based on dense matching of parts-based graphical models. Such a system can be use...
Vaclav Potesil, Timor Kadir, Günther Platsch,...
CASCON
2010
174views Education» more  CASCON 2010»
15 years 2 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
« Prev « First page 3182 / 3244 Last » Next »