Sciweavers

102291 search results - page 20325 / 20459
» Computability in Computational Geometry
Sort
View
138
Voted
WINET
2010
153views more  WINET 2010»
15 years 2 months ago
Data aggregation in sensor networks using learning automata
One way to reduce energy consumption in wireless sensor networks is to reduce the number of packets being transmitted in the network. As sensor networks are usually deployed with a...
Mehdi Esnaashari, Mohammad Reza Meybodi
ACSAC
2010
IEEE
15 years 2 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ACSAC
2010
IEEE
15 years 2 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ACSAC
2010
IEEE
15 years 2 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
134
Voted
ASIACRYPT
2010
Springer
15 years 2 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
« Prev « First page 20325 / 20459 Last » Next »