Sciweavers

149 search results - page 24 / 30
» Practical Techniques for Searches on Encrypted Data
Sort
View
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 7 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
BIBE
2010
IEEE
142views Bioinformatics» more  BIBE 2010»
13 years 4 months ago
Compressed q-Gram Indexing for Highly Repetitive Biological Sequences
The study of compressed storage schemes for highly repetitive sequence collections has been recently boosted by the availability of cheaper sequencing technologies and the flood of...
Francisco Claude, Antonio Fariña, Miguel A....
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
14 years 3 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
ICDE
1998
IEEE
103views Database» more  ICDE 1998»
14 years 10 months ago
Online Generation of Association Rules
We have a large database consisting of sales transactions. We investigate the problem of online mining of association rules in this large database. We show how to preprocess the d...
Charu C. Aggarwal, Philip S. Yu
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang