Sciweavers

704 search results - page 129 / 141
» A Practical Attack on KeeLoq
Sort
View
EWCBR
2008
Springer
13 years 11 months ago
Case-Based Decision Support for Patients with Type 1 Diabetes on Insulin Pump Therapy
Abstract. This paper presents a case-based approach to decision support for diabetes management in patients with Type 1 diabetes on insulin pump therapy. To avoid serious disease c...
Cindy Marling, Jay Shubrook, Frank Schwartz
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
13 years 11 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
AAAI
2010
13 years 11 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
ACSW
2006
13 years 11 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
SSWMC
2004
13 years 11 months ago
Hiding correlation-based watermark templates using secret modulation
A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation func...
Jeroen Lichtenauer, Iwan Setyawan, Reginald L. Lag...