Sciweavers

704 search results - page 122 / 141
» A Practical Attack on KeeLoq
Sort
View
ACMSE
2006
ACM
14 years 3 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
JCDL
2005
ACM
175views Education» more  JCDL 2005»
14 years 3 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
DRM
2005
Springer
14 years 3 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
IJCNLP
2005
Springer
14 years 3 months ago
Inversion Transduction Grammar Constraints for Mining Parallel Sentences from Quasi-Comparable Corpora
Abstract. We present a new implication of Wu’s (1997) Inversion Transduction Grammar (ITG) Hypothesis, on the problem of retrieving truly parallel sentence translations from larg...
Dekai Wu, Pascale Fung
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 3 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani