Sciweavers

1369 search results - page 14 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 9 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
ICRA
2006
IEEE
97views Robotics» more  ICRA 2006»
14 years 1 months ago
Practical Kinematics for Real-time Implementation of Continuum Robots
Abstract - This paper introduces new analyses and algorithms which are essential for the practical implementation of continuous backbone continuum robots. Actuator length limits st...
Bryan A. Jones, William McMahan, Ian D. Walker
CONCUR
2005
Springer
14 years 1 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
NDSS
2006
IEEE
14 years 1 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...
IS
2007
13 years 7 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini