Sciweavers

2715 search results - page 200 / 543
» Database Publication Practices
Sort
View
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
14 years 3 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
14 years 2 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey
CCS
2007
ACM
14 years 2 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
RE
2007
Springer
14 years 2 months ago
Choosing a Tram Route: An Experience in Trading-Off Constraints
Trading-off is a familiar element in requirements practice, but it generally assumes a set of independent requirements competing for resources. Choosing a tram route depends inste...
Ian Alexander
APLAS
2006
ACM
14 years 2 months ago
XML Validation for Context-Free Grammars
String expression analysis conservatively approximates the possible string values generated by a program. We consider the validation of a context-free grammar obtained by the analy...
Yasuhiko Minamide, Akihiko Tozawa