Sciweavers

2957 search results - page 525 / 592
» Processing Self Corrections
Sort
View
CCS
2006
ACM
14 years 1 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
EMISA
2006
Springer
14 years 1 months ago
On Design Principles for Realizing Adaptive Service Flows with BPEL
Abstract: Web service technology offers a promising approach for realizing enterprisewide and cross-organizational business applications. With the Business Process Execution Langua...
Manfred Reichert, Stefanie Rinderle
KDD
2000
ACM
211views Data Mining» more  KDD 2000»
14 years 1 months ago
Mining IC test data to optimize VLSI testing
We describe an application of data mining and decision analysis to the problem of die-level functional test in integrated circuit manufacturing. Integrated circuits are fabricated...
Tony Fountain, Thomas G. Dietterich, Bill Sudyka
CSFW
2010
IEEE
14 years 1 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
AMAST
2008
Springer
14 years 2 days ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano