Examining smart-card security under the threat of power analysis attacks TS Messerges, EA Dabbish, RH Sloan IEEE transactions on computers 51 (5), 541-552, 2002 | 2072 | 2002 |
Investigations of Power Analysis Attacks on Smartcards. TS Messerges, EA Dabbish, RH Sloan Smartcard 99, 151-161, 1999 | 708 | 1999 |
Power analysis attacks of modular exponentiation in smartcards TS Messerges, EA Dabbish, RH Sloan Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999 | 591 | 1999 |
Computing curricula 2005: The overview report R Shackelford, A McGettrick, R Sloan, H Topi, G Davies, R Kamali, ... ACM SIGCSE Bulletin 38 (1), 456-457, 2006 | 290 | 2006 |
Beyond notice and choice: Privacy, norms, and consent RH Sloan, R Warner J. High Tech. L. 14, 370, 2014 | 167 | 2014 |
Simple high-level code for cryptographic arithmetic: With proofs, without compromises A Erbsen, J Philipoom, J Gross, R Sloan, A Chlipala ACM SIGOPS Operating Systems Review 54 (1), 23-30, 2020 | 143 | 2020 |
Learning nested differences of intersection-closed concept classes D Helmbold, R Sloan, MK Warmuth Machine Learning 5, 165-196, 1990 | 138 | 1990 |
Corrigendum to types of noise in data for concept learning RH Sloan Proceedings of the fifth annual workshop on Computational learning theory, 450, 1992 | 134 | 1992 |
Learning integer lattices D Helmbold, R Sloan, MK Warmuth SIAM Journal on Computing 21 (2), 240-266, 1992 | 129 | 1992 |
Reduction rules for time Petri nets RH Sloan, U Buy Acta Informatica 33, 687-706, 1996 | 114 | 1996 |
CS 0.5: a better approach to introductory computer science for majors RH Sloan, P Troy ACM SIGCSE Bulletin 40 (1), 271-275, 2008 | 107 | 2008 |
The AI conference paper assignment problem J Goldsmith, RH Sloan Proc. AAAI Workshop on Preference Handling for Artificial Intelligence …, 2007 | 101 | 2007 |
Can PAC learning algorithms tolerate random attribute noise? SA Goldman, RH Sloan Algorithmica 14 (1), 70-84, 1995 | 95 | 1995 |
Divergence caching in client-server architectures Y Huang, RH Sloan, O Wolfson Proceedings of 3rd International Conference on Parallel and Distributed …, 1994 | 82 | 1994 |
Learning complicated concepts reliably and usefully RL Rivest, R Sloan Proceedings of the Seventh AAAI National Conference on Artificial …, 1988 | 78 | 1988 |
Unauthorized access: The crisis in online privacy and security R Sloan, R Warner Taylor & Francis, 2017 | 60 | 2017 |
A formal model of hierarchical concept-learning RL Rivest, R Sloan Information and Computation 114 (1), 88-114, 1994 | 60 | 1994 |
Malicious omissions and errors in answers to membership queries D Angluin, M Kriķis, RH Sloan, G Turán Machine Learning 28, 211-255, 1997 | 54 | 1997 |
A layered design of discretionary access controls with decidable safety properties JA Solworth, RH Sloan IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 56-67, 2004 | 51 | 2004 |
Reinforcement Learning and Function Approximation. M Irodova, RH Sloan FLAIRS, 455-460, 2005 | 50 | 2005 |