We introduce a novel behavioral test synthesis methodology that attempts to increase module reachability, driven by powerful global design path analysis. Based on the notion of tr...
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
In this paper we describe a scheme to enhance the usability of Tablet PC handwriting recognition systems by creating a software module for recognizing symbols that are not a part ...
Amlan Kundu, Qian Hu, Stanley Boykin, Cheryl Clark...
In this paper, we perform double embedding in the quantization index modulation (QIM) framework where a single coefficient is modified twice, using two quantizers, to embed two bi...