Sciweavers

164 search results - page 12 / 33
» An Implementation of ARM
Sort
View
COMPSYSTECH
2010
13 years 11 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev
WISA
2009
Springer
14 years 5 months ago
Unknown Plaintext Template Attacks
In this paper we present a variation of the template attack classification process that can be applied to block ciphers when the plaintext and ciphertext used are unknown. In a na...
Neil Hanley, Michael Tunstall, William P. Marnane
CIARP
2009
Springer
14 years 5 months ago
Optimizations and Performance of a Robotics Grasping Algorithm Described in Geometric Algebra
Abstract. The usage of Conformal Geometric Algebra leads to algorithms that can be formulated in a very clear and easy to grasp way. But it can also increase the performance of an ...
Florian Wörsdörfer, Florian Stock, Eduar...
CIIA
2009
14 years 19 hour ago
Software Platform based Embedded Multiprocessor SoC Prototyping
This paper describes our experience in processor/threads synchronization using the POSIX API standard for MPSoC virtual applications prototyping. Spin-Lock (Binary Semaphore) imple...
Benaoumeur Senouci, Ali El Moussaoui, Bernard Goos...
IACR
2011
137views more  IACR 2011»
12 years 10 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...