EECS

Results: 4734



#Item
1Cryptography / Exponentials / Cross-platform software / Cryptographic software / GNU Privacy Guard / OpenPGP / Privacy software / RSA / Exponentiation by squaring / Modular exponentiation / ElGamal encryption / Chosen-ciphertext attack

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 18:24:31
2Pebble / Smartwatches / Mathematical logic / Mathematics / Differential topology / Lie algebras / Moschovakis coding lemma

Closure Under Reversal of Languages over Infinite Alphabets

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-08-09 16:22:52
3Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
4USB / Computer hardware / Computing / PS/2 port / Y-cable / Bus / Serial communication / Serial ATA / Wireless USB / USB On-The-Go

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 17:01:11
5Software engineering / Computer programming / Computing / Functional languages / Profilers / Control flow / Profiling / Software optimization / Racket / Arc / Stack / Matthias Felleisen

Feature-Specific Profiling LEIF ANDERSEN, PLT @ Northeastern University, United States of America VINCENT ST-AMOUR, PLT @ Northwestern University, United States of America JAN VITEK, Northeastern University and Czech Tec

Add to Reading List

Source URL: users.eecs.northwestern.edu

Language: English - Date: 2018-10-25 09:39:05
6Computer programming / Software engineering / Computing / Recursion / Computability theory / Theoretical computer science / Subroutines / Algorithms / Quicksort / Divide and conquer algorithm / Recurrent neural network / Artificial neural network

Published as a conference paper at ICLRM AKING N EURAL P ROGRAMMING A RCHITECTURES G ENERALIZE VIA R ECURSION Jonathon Cai, Richard Shin, Dawn Song Department of Computer Science

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2017-03-10 19:56:16
7Circuit complexity / Theoretical computer science / Computational complexity theory / Cryptographic protocols / Electronic engineering / Theory of computation / Secure multi-party computation / Logic families / Digital circuits / Transistortransistor logic / NC / Circuit

Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2014-03-20 23:52:12
8Cryptography / Computer security / Cryptographic hash functions / Password / Rainbow table / SHA-2 / Password strength / Salt

EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
9Computing / Technology / California / EMC Corporation / VMware / Embedded system / Synopsys / USENIX Annual Technical Conference / Debugging / Intel / Software Guard Extensions / Edouard Bugnion

Baris Kasikci Assistant Professor Electrical Engineering and Computer Science University of Michigan 4820 BBB 2260 Hayward Street

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-10-23 14:59:27
10Routing algorithms / Fair division / Computing / Microeconomics / Fairness measure / Max-min fairness / Scheduling / Cloud computing / System resource / Central processing unit / Resource monotonicity / Pareto efficiency

Dominant Resource Fairness: Fair Allocation of Multiple Resource Types Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, Ion Stoica University of California, Berkeley {alig,matei,benh,andyk,shen

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2014-02-27 02:30:26
UPDATE