Sciweavers

905 search results - page 10 / 181
» The Case Against Micropayments
Sort
View
FLAIRS
2007
13 years 9 months ago
Investigating the Effectiveness of Applying Case-Based Reasoning to the Game of Texas Hold'em
This paper investigates the use of the case-based reasoning methodology applied to the game of Texas hold’em. The development of a CASe-based Poker playER (CASPER) is discussed....
Jonathan Rubin, Ian Watson
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
13 years 10 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
EUROCRYPT
2008
Springer
13 years 8 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
ICDE
2003
IEEE
209views Database» more  ICDE 2003»
14 years 8 months ago
An Evaluation of Regular Path Expressions with Qualifiers against XML Streams
This paper presents SPEX, a streamed and progressive evaluation of regular path expressions with XPath-like qualifiers against XML streams. SPEX proceeds as follows. An expression...
Dan Olteanu, François Bry, Tobias Kiesling
DRM
2005
Springer
14 years 16 days ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...