How low can you go? Using side-channel data to enhance brute-force key recovery. | 0 | 0.34 | 2016 |
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack. | 0 | 0.34 | 2015 |
A Leakage Resilient MAC. | 2 | 0.36 | 2013 |
Efficient Resource Management for Game Server Hosting | 2 | 0.37 | 2008 |
A Haptic Enabled DNA Model | 1 | 0.38 | 2008 |
Context Modeling to Enforce Interoperability in Web Service Definition | 1 | 0.49 | 2007 |
A cognitive approach to the definition and evaluation of a standard for naval tactical display symbology | 0 | 0.34 | 1990 |