Sciweavers

12183 search results - page 5 / 2437
» Computers under Attacks!
Sort
View
WG
2005
Springer
14 years 28 days ago
Fixed-Parameter Algorithms for Protein Similarity Search Under mRNA Structure Constraints
Abstract. In the context of protein engineering, we consider the problem of computing an mRNA sequence of maximal codon-wise similarity to a given mRNA (and consequently, to a give...
Guillaume Blin, Guillaume Fertin, Danny Hermelin, ...
ERSHOV
2006
Springer
13 years 9 months ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld
NDSS
2003
IEEE
14 years 22 days ago
Detecting Service Violations and DoS Attacks
Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the reso...
Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava
IWDW
2005
Springer
14 years 28 days ago
Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Un
Calculation of watermarking capacities of private Laplacian watermarking systems with the magnitude-error distortion measure under fixed attacks is addressed. First, in the case o...
Wei Sun, En-Hui Yang
DCC
2006
IEEE
14 years 7 months ago
Index Calculation Attacks on RSA Signature and Encryption
At Crypto '85, Desmedt and Odlyzko described a chosen-ciphertext attack against plain RSA encryption. The technique can also be applied to RSA signatures and enables an existe...
Jean-Sébastien Coron, David Naccache, Yvo Desmedt...