Sciweavers

525 search results - page 53 / 105
» The Davies-Murphy Power Attack
Sort
View
MICRO
1997
IEEE
82views Hardware» more  MICRO 1997»
14 years 2 months ago
Procedure Based Program Compression
Cost and power consumption are two of the most important design factors for many embedded systems, particularly consumer devices. Products such as Personal Digital Assistants, pag...
Darko Kirovski, Johnson Kin, William H. Mangione-S...
IFIP
2009
Springer
14 years 4 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
ICIP
2005
IEEE
14 years 11 months ago
Collusion-resistant intentional de-synchronization for digital video fingerprinting
A powerful class of attacks in multimedia fingerprinting is known as collusion attacks, where a clique of colluders, each having a copy of the same multimedia content with differe...
Mehmet Kivanç Mihçak, Yinian Mao
IWCMC
2006
ACM
14 years 3 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung