Sciweavers

4690 search results - page 844 / 938
» An operational semantics for Scheme
Sort
View
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
14 years 4 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
DATE
2007
IEEE
100views Hardware» more  DATE 2007»
14 years 4 months ago
Working with process variation aware caches
Deep-submicron designs have to take care of process variation effects as variations in critical process parameters result in large variations in access latencies of hardware compo...
Madhu Mutyam, Narayanan Vijaykrishnan
ICC
2007
IEEE
175views Communications» more  ICC 2007»
14 years 4 months ago
An Adaptive MIMO System Based on Unified Belief Propagation Detection
—An adaptive multiple input and multiple output with the code matrix index feedback [8]. One detector will (MIMO) system based on the unified belief propagation (BP) work in the ...
Xiumei Yang, Yong Xiong, Fan Wang
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 4 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
LCN
2006
IEEE
14 years 4 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy