Sciweavers

1085 search results - page 181 / 217
» A Timing Attack on RC5
Sort
View
SACI
2009
IEEE
14 years 4 months ago
Experiments on a grid layer prototype for shared data programming model
—In the grid context, there is little support for programming paradigms such as shared data or associative programming. We have previously proposed an original idea to attack sha...
Dacian Tudor, Georgiana Macariu, Wolfgang Schreine...
IPPS
2009
IEEE
14 years 4 months ago
Crash fault detection in celerating environments
Failure detectors are a service that provides (approximate) information about process crashes in a distributed system. The well-known “eventually perfect” failure detector, 3P...
Srikanth Sastry, Scott M. Pike, Jennifer L. Welch
WINE
2009
Springer
111views Economy» more  WINE 2009»
14 years 4 months ago
Prediction Mechanisms That Do Not Incentivize Undesirable Actions
A potential downside of prediction markets is that they may incentivize agents to take undesirable actions in the real world. For example, a prediction market for whether a terrori...
Peng Shi, Vincent Conitzer, Mingyu Guo
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham
RAID
2009
Springer
14 years 4 months ago
Multi-byte Regular Expression Matching with Speculation
Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature in the database represents an attack or a vulnerability. IPSs...
Daniel Luchaup, Randy Smith, Cristian Estan, Somes...