Sciweavers

258 search results - page 11 / 52
» Faults' context matters
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 5 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
ECML
1993
Springer
13 years 11 months ago
Exploiting Context When Learning to Classify
This paper addresses the problem of classifying observations when features are context-sensitive, specifically when the testing set involves a context that is different from the t...
Peter D. Turney
PERCOM
2006
ACM
14 years 7 months ago
SmartContacts: A Large Scale Social Context Service Discovery System
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. SmartContacts provides a solution to this problem by empowering the caller to...
Yong Liu, Kay Connelly
FMSP
2000
ACM
152views Formal Methods» more  FMSP 2000»
13 years 12 months ago
Fault origin adjudication
When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
BIRTHDAY
2012
Springer
12 years 3 months ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...