Sciweavers

2468 search results - page 359 / 494
» Aggregation operators 2003
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 2 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
DSN
2003
IEEE
14 years 2 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
14 years 2 months ago
Adoption Process of Upgrading Software: An Empirical Study of Windows XP
There are many studies in Information Systems on the adoption of new innovations. This paper, on the other hand, presents the findings of an empirical study, which explores factor...
Michael C. L. Lai, Susanna S. Y. Ho, Wendy W. Y. H...
MICRO
2003
IEEE
166views Hardware» more  MICRO 2003»
14 years 2 months ago
Razor: A Low-Power Pipeline Based on Circuit-Level Timing Speculation
With increasing clock frequencies and silicon integration, power aware computing has become a critical concern in the design of embedded processors and systems-on-chip. One of the...
Dan Ernst, Nam Sung Kim, Shidhartha Das, Sanjay Pa...
SAINT
2003
IEEE
14 years 2 months ago
JGN IPv6 Network
To cope with the various problems arising from Internet protocol such as scarcity of IP addresses in the Internet and increase in the number of paths, research and development has...
Kazumasa Kobayashi, Kazuhiko Nakamura, Hisayoshi H...