Sciweavers

4101 search results - page 608 / 821
» Differential Power Analysis
Sort
View
IMR
2005
Springer
14 years 4 months ago
Design and Implementation of a Corporate Mesh Object
Today, finite element technologies allow engineers to analyze complex assemblies and subsystems. With CPU power constantly increasing, it is not unreasonable to state that the eng...
John Svitek, Wa Kwok, Joseph R. Tristano
ISMDA
2005
Springer
14 years 4 months ago
Foreseeing Promising Bio-medical Findings for Effective Applications of Data Mining
Abstract. The increasing availability of automated data collection tools, database technologies and Information and Communication Technologies in biomedicine and health care have l...
Stefano Bonacina, Marco Masseroli, Francesco Pinci...
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 4 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
ITRUST
2004
Springer
14 years 3 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
WEBI
2004
Springer
14 years 3 months ago
An Integrated Approach to Discovery in Complex Information Spaces
As the amount of available data continues to increase, more and more effective means for discovering important patterns and relationships within that data are required. Although t...
Daryl H. Hepting, Cory J. Butz