Sciweavers

191 search results - page 35 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
INDOCRYPT
2010
Springer
13 years 6 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
JNW
2008
177views more  JNW 2008»
13 years 8 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
IPPS
2009
IEEE
14 years 3 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
14 years 2 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
DAGSTUHL
2010
13 years 10 months ago
Visual Simulation of Flow
We have adopted a numerical method from computational fluid dynamics, the Lattice Boltzmann Method (LBM), for real-time simulation and visualization of flow and amorphous phenomen...
Arie E. Kaufman, Ye Zhao