Sciweavers

364 search results - page 53 / 73
» E-Voting System Security Optimization
Sort
View
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 1 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
14 years 28 days ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
PQCRYPTO
2010
187views Cryptology» more  PQCRYPTO 2010»
13 years 11 months ago
Information-Set Decoding for Linear Codes over Fq
The best known non-structural attacks against code-based cryptosystems are based on information-set decoding. Stern’s algorithm and its improvements are well optimized and the co...
Christiane Peters
FPL
2004
Springer
143views Hardware» more  FPL 2004»
13 years 11 months ago
Exploring Area/Delay Tradeoffs in an AES FPGA Implementation
Abstract. Field-Programmable Gate Arrays (FPGAs) have lately become a popular target for implementing cryptographic block ciphers, as a well-designed FPGA solution can combine some...
Joseph Zambreno, David Nguyen, Alok N. Choudhary
MATA
2000
Springer
13 years 11 months ago
YAAP: Yet Another Active Platform
We present YAAP: a generic active network architecture with the ability to manually and dynamically deploy network services within distributed network nodes and providing a secure ...
Nicolas Rouhana, Samer Boustany, Eric Horlait