Sciweavers

2513 search results - page 149 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 1 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
TSE
2010
110views more  TSE 2010»
14 years 8 months ago
Proofs from Tests
We present an algorithm Dash to check if a program P satisfies a safety property ϕ. The unique feature of the algorithm is that it uses only test generation operations, and nes ...
Nels E. Beckman, Aditya V. Nori, Sriram K. Rajaman...
WOSP
2005
ACM
15 years 3 months ago
Modeling the performance of a NAT/firewall network service for the IXP2400
The evolution towards IP-aware access networks creates the possibility (and, indeed, the desirability) of additional network services, like firewalling or NAT, integrated into th...
Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminc...
COMPSAC
2008
IEEE
14 years 12 months ago
Decision Support for User Interface Design: Usability Diagnosis by Time Analysis of the User Activity
This paper presents a methodology for setting up a Decision Support system for User Interface Design (DSUID). We first motivate the role and contributions of DSUID and then demons...
Avi Harel, Ron S. Kenett, Fabrizio Ruggeri
WSC
2004
14 years 11 months ago
Practical 3D Animation of Multiply Articulated Construction Equipment
This paper presents research that led to the design and implementation of practical 3D animation methods to visualize multiply-articulated construction equipment in 3D animations ...
Vineet R. Kamat, Julio C. Martínez