Sciweavers

315 search results - page 14 / 63
» Claims Analysis
Sort
View
116
Voted
CARDIS
2010
Springer
187views Hardware» more  CARDIS 2010»
15 years 10 months ago
Improved Fault Analysis of Signature Schemes
At ACISP 2004, Giraud and Knudsen presented the first fault analysis of DSA, ECDSA, XTR-DSA, Schnorr and ElGamal signatures schemes that considered faults affecting one byte. The...
Christophe Giraud, Erik Woodward Knudsen, Michael ...
131
Voted
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
15 years 10 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...
148
Voted
HASE
2007
IEEE
15 years 10 months ago
Integrating Product-Line Fault Tree Analysis into AADL Models
Fault Tree Analysis (FTA) is a safety-analysis technique that has been recently extended to accommodate product-line engineering for critical domains. This paper describes a tool-...
Hongyu Sun, Miriam Hauptman, Robyn R. Lutz
115
Voted
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
15 years 9 months ago
Conversations in the Blogosphere: An Analysis "From the Bottom Up"
The "blogosphere" has been claimed to be a densely interconnected conversation, with bloggers linking to other bloggers, referring to them in their entries, and posting ...
Susan C. Herring, Inna Kouper, John C. Paolillo, L...
117
Voted
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 10 months ago
An Analysis of the Compact XSL Attack on BES and Embedded SMS4
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100 , which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the ...
Jiali Choy, Huihui Yap, Khoongming Khoo