Sciweavers

10995 search results - page 2187 / 2199
» Positioning
Sort
View
ASIACRYPT
2011
Springer
12 years 9 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
BIRTHDAY
2011
Springer
12 years 9 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
CASE
2011
70views more  CASE 2011»
12 years 9 months ago
Automation of assembly and packaging at the micro/nano-scale
— This paper provides a general overview of the material covered in the fullday workshop with the same title devoted to the field of automation in microassembly and packaging at...
Micky Rakotondrabe, Yassine Haddab, Cédric ...
CCS
2011
ACM
12 years 9 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
COMBINATORICA
2011
12 years 9 months ago
On the chromatic number of random geometric graphs
Given independent random points X1, . . . , Xn ∈ Rd with common probability distribution ν, and a positive distance r = r(n) > 0, we construct a random geometric graph Gn wi...
Colin McDiarmid, Tobias Müller
« Prev « First page 2187 / 2199 Last » Next »