Sciweavers

1085 search results - page 203 / 217
» A Timing Attack on RC5
Sort
View
CAD
2005
Springer
13 years 7 months ago
Fidelity in visualizing large-scale simulations
Computer simulations are powerful tools frequently used today in many important applications, for example to build safer buildings, to crash-test an automobile before it is built,...
Voicu Popescu, Christoph M. Hoffmann
TOG
2008
106views more  TOG 2008»
13 years 7 months ago
Fast modal sounds with scalable frequency-domain synthesis
Audio rendering of impact sounds, such as those caused by falling objects or explosion debris, adds realism to interactive 3D audiovisual applications, and can be convincingly ach...
Nicolas Bonneel, George Drettakis, Nicolas Tsingos...
TPDS
2008
133views more  TPDS 2008»
13 years 7 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
WWW
2001
ACM
14 years 8 months ago
Efficient Acquisition of Web Data through Restricted Query Interfaces
A wealth of information is available on the Web. But often, such data are hidden behind form interfaces which allow only a restrictive set of queries over the underlying databases...
Cláudio T. Silva, Juliana Freire, Simon Bye...
HPCA
2005
IEEE
14 years 7 months ago
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
With the increasing concern of the security on high performance multiprocessor enterprise servers, more and more effort is being invested into defending against various kinds of a...
Youtao Zhang, Lan Gao, Jun Yang 0002, Xiangyu Zhan...