Sciweavers

592 search results - page 100 / 119
» Architecture and Implementation of an Embedded Wormhole
Sort
View
DAC
2005
ACM
14 years 9 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
ICCD
2008
IEEE
111views Hardware» more  ICCD 2008»
14 years 5 months ago
Power switch characterization for fine-grained dynamic voltage scaling
—Dynamic voltage scaling (DVS) provides power savings for systems with varying performance requirements. One low overhead implementation of DVS uses PMOS power switches to connec...
Liang Di, Mateja Putic, John Lach, Benton H. Calho...
HICSS
2009
IEEE
112views Biometrics» more  HICSS 2009»
14 years 3 months ago
Optimal Pumping Schedule and Salinity Control in a Coastal Aquifer: a Decision Support System
Proper management of coastal wells is important in order to satisfy demand, minimize costs, control salinity increase, and ultimately to define water resource strategies which are...
T. Ka'eo Duarte, Riccardo Minciardi, Michela Robba...
AFRICACRYPT
2010
Springer
14 years 2 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
TABLETOP
2008
IEEE
14 years 2 months ago
Experiences with building a thin form-factor touch and tangible tabletop
In this paper we describe extensions to our work on ThinSight, necessary to scale the system to larger tabletop displays. The technique integrates optical sensors into existing of...
Shahram Izadi, Alex Butler, Steve Hodges, Darren W...