Sciweavers

2478 search results - page 52 / 496
» Message from the Chair
Sort
View
CHES
2009
Springer
141views Cryptology» more  CHES 2009»
16 years 4 months ago
Fault Attacks on RSA Signatures with Partially Unknown Messages
Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90's, Boneh, DeMillo and Lipton [6] introduced fault-based attacks...
Jean-Sébastien Coron, Antoine Joux, Ilya Ki...
GLOBECOM
2008
IEEE
15 years 10 months ago
Time Dependent Message Spraying for Routing in Intermittently Connected Networks
—Intermittently connected mobile networks, also called Delay Tolerant Networks (DTNs), are wireless networks in which at any given time instance, the probability of having a comp...
Eyuphan Bulut, Zijian Wang, Boleslaw K. Szymanski
COLCOM
2007
IEEE
15 years 10 months ago
Message replication in unstructured peer-to-peer network
—Recently, unstructured peer-to-peer (P2P) applications have become extremely popular. Searching in these networks has been a hot research topic. Flooding-based searching, which ...
Osama Al-Haj Hassan, Lakshmish Ramaswamy
ISICA
2007
Springer
15 years 10 months ago
Instant Message Clustering Based on Extended Vector Space Model
Instant intercommunion techniques such as Instant Messaging (IM) are widely popularized. Aiming at such kind of large scale masscommunication media, clustering on its text conte...
Le Wang, Yan Jia, Weihong Han
CSCW
2004
ACM
15 years 9 months ago
QnA: augmenting an instant messaging client to balance user responsiveness and performance
The growing use of Instant Messaging for social and work-related communication has created a situation where incoming messages often become a distraction to users while they are p...
Daniel Avrahami, Scott E. Hudson