Sciweavers

4305 search results - page 75 / 861
» Analysing Protocol Implementations
Sort
View
WISTP
2009
Springer
15 years 9 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
93
Voted
GIL
2004
15 years 3 months ago
Ecologic-Economic Modeling of Agricultural Land Use for Policy Decisions: An Integrated Model Implemented for North East Region
: This article presents an integrated ecologic and economic model to study landscape and land use change, using the Spatial Analysis Modelling Tool (SAMT). The study involves integ...
Igbekele A. Ajibefun, Karl-Otto Wenkel, Ralf Wiela...
120
Voted
JMM2
2007
157views more  JMM2 2007»
15 years 2 months ago
Sub-band Implementation of Adaptive Nonlinear Filter for Adaptive Nonlinear Echo Cancellation
—The adaptive Volterra filter has been successfully applied in nonlinear acoustic echo cancellation (AEC) systems and nonlinear line echo cancellation systems, but its applicatio...
Dayong Zhou, Yunhua Wang, Victor E. DeBrunner, Lin...
VR
2008
IEEE
174views Virtual Reality» more  VR 2008»
15 years 25 days ago
Stable haptic interaction using a damping model to implement a realistic tooth-cutting simulation for dental training
It is difficult to implement a stable and realistic haptic simulation for cutting rigid objects that is based on a damping model because of an inevitable conflict between stability...
Guanyang Liu, Yuru Zhang, Dangxiao Wang, William T...
110
Voted
CCS
2009
ACM
16 years 3 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria