Sciweavers

5525 search results - page 943 / 1105
» Verification of Model Transformations
Sort
View
CHES
2006
Springer
88views Cryptology» more  CHES 2006»
15 years 7 months ago
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Lo...
Zhimin Chen, Yujie Zhou
EDOC
2004
IEEE
15 years 7 months ago
Towards an MDA-Oriented UML Profile for Distribution
The era of distributed systems is upon us. Middlewarespecific concerns, and especially the distribution concern, which is the core of any middleware-mediated application, are addr...
Raul Silaghi, Frédéric Fondement, Al...
145
Voted
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
CCGRID
2001
IEEE
15 years 7 months ago
Compute Power Market: Towards a Market-Oriented Grid
The Compute Power Market (CPM) is a market-based resource management and job scheduling system for grid computing on Internet-wide computational resources, particularly low-end pe...
Rajkumar Buyya, Sudharshan Vazhkudai
136
Voted
CVPR
2010
IEEE
15 years 7 months ago
Real-time Tracking of Multiple Occluding Objects using Level Sets
We derive a probabilistic framework for robust, realtime, visual tracking of multiple previously unseen objects from a moving camera. This framework models the discrete depth orde...
Charles Bibby, Ian Reid