Sciweavers

3731 search results - page 71 / 747
» cases 2006
Sort
View
106
Voted
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 4 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
141
Voted
E2EMON
2006
IEEE
15 years 4 months ago
Object-Relational DBMS for Packet-Level Traffic Analysis: Case Study on Performance Optimization
Analyzing Internet traffic at packet level involves generally large amounts of raw data, derived data, and results from various analysis tasks. In addition, the analysis often proc...
Matti Siekkinen, Ernst W. Biersack, Vera Goebel
EUROCRYPT
2006
Springer
15 years 4 months ago
The Function Field Sieve in the Medium Prime Case
In this paper, we study the application of the function field sieve algorithm for computing discrete logarithms over finite fields of the form Fqn when q is a medium-sized prime po...
Antoine Joux, Reynald Lercier
89
Voted
DMIN
2006
106views Data Mining» more  DMIN 2006»
15 years 1 months ago
A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile
This paper describes an effective medical claim fraud/abuse detection system based on data mining used by a Chilean private health insurance company. Fraud and abuse in medical cla...
Pedro A. Ortega, Cristián J. Figueroa, Gonz...
79
Voted
AUTOMATICA
2006
68views more  AUTOMATICA 2006»
15 years 18 days ago
Relaxed fault detection and isolation: An application to a nonlinear case study
Given a number of possibly concurrent faults (and disturbances) that may affect a nonlinear dynamic system, it may not be possible to solve the standard fault detection and isolat...
Raffaella Mattone, Alessandro De Luca