Sciweavers

872 search results - page 90 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
SP
2009
IEEE
122views Security Privacy» more  SP 2009»
14 years 2 months ago
Plaintext Recovery Attacks against SSH
This paper presents a variety of plaintext-recovering attacks against SSH. We implemented a proof of concept of our attacks against OpenSSH, where we can verifiably recover 14 bi...
Martin R. Albrecht, Kenneth G. Paterson, Gaven J. ...
CISS
2008
IEEE
14 years 2 months ago
Optimizing wireless networks for heterogeneous spatial loads
—Large-scale wireless networks must be designed such that there are no gaps in coverage. It is also desirable to minimize the number of access points used in order to minimize th...
Balaji Rengarajan, Gustavo de Veciana
DELTA
2008
IEEE
14 years 2 months ago
A Single-Stage SEPIC PFC Converter for Multiple Lighting LED Lamps
—This paper presents a SEPIC PFC converter for driving multiple lighting LED lamps. With the aid of this converter, high power factor and high efficiency can be achieved by a sim...
Hsiu-Ming Huang, Shih-Hsiung Twu, Shih-Jen Cheng, ...
ICC
2008
IEEE
136views Communications» more  ICC 2008»
14 years 2 months ago
Flow-Optimized Asynchronous Relay Selection Protocol for Parallel Relay Networks
—We investigate the problem of flow optimization in a parallel relay network which consists of a single source sending information to a single destination through multiple relay...
Wai Pan Tam, Tat M. Lok, Tan F. Wong
ISCAS
2008
IEEE
118views Hardware» more  ISCAS 2008»
14 years 2 months ago
Image sensor with focal plane change event driven video compression
— An image sensor with focal plane based hardware acceleration of video compression is presented. The 90×90 pixel CMOS image sensor provides in-pixel processing of intensity cha...
Yu M. Chi, Ralph Etienne-Cummings, Gert Cauwenberg...