Sciweavers

329 search results - page 21 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
ELPUB
2007
ACM
13 years 11 months ago
The Fight against Spam - A Machine Learning Approach
The paper presents a brief survey of the fight between spammers and antispam software developers, and also describes new approaches to spam filtering. In the first two sections we...
Karel Jezek, Jiri Hynek
COMSUR
2011
196views Hardware» more  COMSUR 2011»
12 years 7 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
HUC
2011
Springer
12 years 7 months ago
Sundroid: solar radiation awareness with smartphones
While the sun is important for our health, overexposure to sunlight carries significant health risks ranging from sunburn to skin cancer. Although people know about these risks, ...
Thomas Fahrni, Michael Kuhn 0002, Philipp Sommer, ...
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
14 years 1 months ago
Three Case Studies of Large-Scale Data Flows
We survey three examples of large-scale scientific workflows that we are working with at Cornell: the Arecibo sky survey, the CLEO high-energy particle physics experiment, and t...
William Y. Arms, Selcuk Aya, Manuel Calimlim, Jim ...
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 11 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers