Sciweavers

68 search results - page 8 / 14
» Three new factors of Fermat numbers
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
PDP
2011
IEEE
14 years 1 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
SAC
2010
ACM
14 years 9 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel
EUROCRYPT
1999
Springer
15 years 1 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
75
Voted
BMCBI
2010
133views more  BMCBI 2010»
14 years 9 months ago
Translog, a web browser for studying the expression divergence of homologous genes
Background: Increasing amount of data from comparative genomics, and newly developed technologies producing accurate gene expression data facilitate the study of the expression di...
Xianjun Dong, Altuna Akalin, Yogita Sharma, Boris ...