Sciweavers

8874 search results - page 12 / 1775
» A New Implementation of Automath
Sort
View
IFIP
2009
Springer
13 years 8 months ago
How to Foresee and Capture the Effects of RFID Implementation
RFID technology is, according to both industry and academia, one of the most promising new technologies for improving logistics and manufacturing excellence this decade. This resea...
Kristin Hergot, Lars Skjelstad
WISA
2010
Springer
13 years 8 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...
ICDE
2007
IEEE
337views Database» more  ICDE 2007»
15 years 8 days ago
The New Casper: A Privacy-Aware Location-Based Database Server
This demo presents Casper; a framework in which users entertain anonymous location-based services. Casper consists of two main components; the location anonymizer that blurs the u...
Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref
PLDI
2012
ACM
12 years 1 months ago
The implicit calculus: a new foundation for generic programming
Generic programming (GP) is an increasingly important trend in programming languages. Well-known GP mechanisms, such as type classes and the C++0x concepts proposal, usually combi...
Bruno C. d. S. Oliveira, Tom Schrijvers, Wontae Ch...
WISEC
2010
ACM
14 years 3 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt