Sciweavers

1085 search results - page 191 / 217
» A Timing Attack on RC5
Sort
View
ICDM
2002
IEEE
156views Data Mining» more  ICDM 2002»
14 years 2 months ago
Predicting Rare Events In Temporal Domains
Temporal data mining aims at finding patterns in historical data. Our work proposes an approach to extract temporal patterns from data to predict the occurrence of target events,...
Ricardo Vilalta, Sheng Ma
CALC
2001
Springer
171views Cryptology» more  CALC 2001»
14 years 2 months ago
Approximate Integer Common Divisors
We show that recent results of Coppersmith, Boneh, Durfee and Howgrave-Graham actually apply in the more general setting of (partially) approximate common divisors. This leads us t...
Nick Howgrave-Graham
PODS
1999
ACM
95views Database» more  PODS 1999»
14 years 2 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...
ESORICS
1994
Springer
14 years 1 months ago
The ESPRIT Project CAFE - High Security Digital Payment Systems
CAFE ("Conditional Access for Europe") is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for condit...
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, ...
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
14 years 1 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin