Sciweavers

225 search results - page 4 / 45
» Individual resistance to IT innovations
Sort
View
SEC
2008
13 years 9 months ago
An Operation-Based Metric for CPA Resistance
Differential power analysis (DPA) is a strong attack upon cryptographic devices such as smartcards. Correlation power analysis (CPA) is a specific form of DPA where the Hamming-wei...
Jing Pan, J. I. den Hartog, Erik P. de Vink
ICASSP
2011
IEEE
12 years 11 months ago
Diffusions of innovations on deterministic topologies
In this paper, we are interested in modeling diffusion of innovations on social networks. We focus on a scenario where innovation emerges at a small number of nodes in the society...
Mehmet Ercan Yildiz, Daron Acemoglu, Asuman E. Ozd...
DFT
2007
IEEE
101views VLSI» more  DFT 2007»
14 years 1 months ago
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits
Many side-channel attacks on implementations of cryptographic algorithms have been developed in recent years demonstrating the ease of extracting the secret key. In response, vari...
Francesco Regazzoni, Thomas Eisenbarth, Johann Gro...
WAW
2007
Springer
120views Algorithms» more  WAW 2007»
14 years 1 months ago
Manipulation-Resistant Reputations Using Hitting Time
Popular reputation systems for linked networks can be manipulated by spammers who strategically place links. The reputation of node v is interpreted as the world’s opinion of vâ...
John E. Hopcroft, Daniel Sheldon
AVI
2006
13 years 9 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...