Sciweavers

16218 search results - page 3182 / 3244
» Standards
Sort
View
ACSAC
2010
IEEE
14 years 10 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou
ASIACRYPT
2010
Springer
14 years 10 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
ASIACRYPT
2010
Springer
14 years 10 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
BMVC
2010
14 years 10 months ago
Improved Anatomical Landmark Localization in Medical Images Using Dense Matching of Graphical Models
We propose a method for reliably and accurately identifying anatomical landmarks in 3D CT volumes based on dense matching of parts-based graphical models. Such a system can be use...
Vaclav Potesil, Timor Kadir, Günther Platsch,...
CASCON
2010
174views Education» more  CASCON 2010»
14 years 10 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
« Prev « First page 3182 / 3244 Last » Next »