Sciweavers

4305 search results - page 75 / 861
» Analysing Protocol Implementations
Sort
View
WISTP
2009
Springer
14 years 3 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
GIL
2004
13 years 10 months ago
Ecologic-Economic Modeling of Agricultural Land Use for Policy Decisions: An Integrated Model Implemented for North East Region
: This article presents an integrated ecologic and economic model to study landscape and land use change, using the Spatial Analysis Modelling Tool (SAMT). The study involves integ...
Igbekele A. Ajibefun, Karl-Otto Wenkel, Ralf Wiela...
JMM2
2007
157views more  JMM2 2007»
13 years 8 months ago
Sub-band Implementation of Adaptive Nonlinear Filter for Adaptive Nonlinear Echo Cancellation
—The adaptive Volterra filter has been successfully applied in nonlinear acoustic echo cancellation (AEC) systems and nonlinear line echo cancellation systems, but its applicatio...
Dayong Zhou, Yunhua Wang, Victor E. DeBrunner, Lin...
VR
2008
IEEE
174views Virtual Reality» more  VR 2008»
13 years 7 months ago
Stable haptic interaction using a damping model to implement a realistic tooth-cutting simulation for dental training
It is difficult to implement a stable and realistic haptic simulation for cutting rigid objects that is based on a damping model because of an inevitable conflict between stability...
Guanyang Liu, Yuru Zhang, Dangxiao Wang, William T...
CCS
2009
ACM
14 years 9 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria