Sciweavers

217 search results - page 39 / 44
» A Knowledge Base for Justified Information Security Decision...
Sort
View
FPL
2003
Springer
114views Hardware» more  FPL 2003»
14 years 26 days ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
WWW
2009
ACM
14 years 8 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
ICISS
2009
Springer
14 years 2 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
SIGCSE
2008
ACM
365views Education» more  SIGCSE 2008»
13 years 7 months ago
Computer science olympiad: exploring computer science through competition
Generating interest in specialized areas of Computer Science (CS) is one of the goals of the department of Computer and Information Science at Spelman College as with most departm...
Iretta B. C. Kearse, Charles Hardnett
ITNG
2010
IEEE
13 years 6 months ago
Record Setting Software Implementation of DES Using CUDA
—The increase in computational power of off-the-shelf hardware offers more and more advantageous tradeoffs among efficiency, cost and availability, thus enhancing the feasibil...
Giovanni Agosta, Alessandro Barenghi, Fabrizio De ...