Sciweavers

2048 search results - page 302 / 410
» The Tale of Two Projects - Abstract
Sort
View
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 7 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
100
Voted
FC
2010
Springer
141views Cryptology» more  FC 2010»
15 years 7 months ago
When Information Improves Information Security
We investigate a mixed economy of an individual rational expert and several na¨ıve near-sighted agents in the context of security decision making. Agents select between three ca...
Jens Grossklags, Benjamin Johnson, Nicolas Christi...
119
Voted
GPCE
2007
Springer
15 years 7 months ago
Library composition and adaptation using c++ concepts
Large scale software is composed of libraries produced by different entities. Non-intrusive and efficient mechanisms for adapting data structures from one library to conform to AP...
Jaakko Järvi, Matthew A. Marcus, Jacob N. Smi...
132
Voted
HRI
2007
ACM
15 years 7 months ago
On-line behaviour classification and adaptation to human-robot interaction styles
This paper presents a proof-of-concept of a robot that is adapting its behaviour on-line, during interactions with a human according to detected play styles. The study is part of ...
Dorothée François, Daniel Polani, Ke...
133
Voted
ICAIL
2007
ACM
15 years 7 months ago
The LKIF Core Ontology of Basic Legal Concepts
In this paper we describe a legal core ontology that is part of a generic architecture for legal knowledge systems, which will enable the interchange of knowledge between existing ...
Rinke Hoekstra, Joost Breuker, Marcello Di Bello, ...