Sciweavers

113 search results - page 16 / 23
» A material history of bits
Sort
View
INFOCOM
1998
IEEE
14 years 3 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
14 years 19 days ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
KYOTODL
2000
131views more  KYOTODL 2000»
14 years 6 days ago
Building a Digital Library of Captured Educational Experiences
Since 1995, we have been researching the application of ubiquitous computing technology to support the automated capture of live university lectures so that students and teachers ...
Gregory D. Abowd, Lonnie D. Harvel, Jason A. Broth...
MVA
1992
14 years 17 hour ago
High Speed Autofocus for Microscopic Images
2 Computational Theory The processing of biological specimens or the 2.1 Overview examination of material surfaces for quality control requires a fast and precise autofocus system....
J. E. Fischer, D. Homeister, J. Lehmler, G. Roos
ICDT
2009
ACM
147views Database» more  ICDT 2009»
14 years 11 months ago
The average-case complexity of counting distinct elements
We continue the study of approximating the number of distinct elements in a data stream of length n to within a (1? ) factor. It is known that if the stream may consist of arbitra...
David P. Woodruff