Sciweavers

1425 search results - page 110 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
EKAW
2000
Springer
14 years 28 days ago
What's in an Electronic Business Model?
An electronic business model is an important baseline for the development of e-commerce system applications. Essentially, it provides the design rationale for e-commerce systems fr...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
CSMR
2009
IEEE
14 years 4 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
EUROCRYPT
2009
Springer
14 years 10 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
ARC
2007
Springer
169views Hardware» more  ARC 2007»
14 years 3 months ago
Designing Heterogeneous FPGAs with Multiple SBs
Abstract. The novel design of high-speed and low-energy FPGA routing architecture consisting of appropriate wire segments and multiple Switch Boxes is introduced. For that purpose,...
Kostas Siozios, Stelios Mamagkakis, Dimitrios Soud...
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 2 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi