Sciweavers

219 search results - page 5 / 44
» How useful are your comments
Sort
View
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
13 years 12 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
KBSE
2010
IEEE
13 years 6 months ago
How did you specify your test suite
Although testing is central to debugging and software certiļ¬cation, there is no adequate language to specify test suites over source code. Such a language should be simple and c...
Andreas Holzer, Christian Schallhart, Michael Taut...
MHCI
2004
Springer
14 years 26 days ago
"Please Turn ON Your Mobile Phone" - First Impressions of Text-Messaging in Lectures
Previous work by Draper and Brown [3] investigated the use of specialized handsets to increase interactivity in lecture settings. Inspired by their encouraging findings we have bee...
Matt Jones, Gary Marsden
PET
2010
Springer
13 years 11 months ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to ā€œdevice ļ¬ngerprintingā€ via the version and conļ¬guration information that they will transmit to website...
Peter Eckersley
WEBI
2010
Springer
13 years 5 months ago
How to Improve Your Google Ranking: Myths and Reality
Abstract--Search engines have greatly influenced the way people access information on the Internet as such engines provide the preferred entry point to billions of pages on the Web...
Ao-Jan Su, Y. Charlie Hu, Aleksandar Kuzmanovic, C...