Sciweavers

121 search results - page 16 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
CORR
2006
Springer
125views Education» more  CORR 2006»
13 years 10 months ago
Reversible Logic to Cryptographic Hardware: A New Paradigm
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed i...
Himanshu Thapliyal, Mark Zwolinski
JSAC
2007
78views more  JSAC 2007»
13 years 9 months ago
VMesh: Distributed Segment Storage for Peer-to-Peer Interactive Video Streaming
Abstract—Provisioning random access functions in peer-topeer on-demand video streaming is challenging, due to not only the asynchronous user interactivity but also the unpredicta...
Wai-Pun Ken Yiu, Xing Jin, Shueng-Han Gary Chan
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ICPR
2010
IEEE
13 years 7 months ago
Track Initialization in Low Frame Rate and Low Resolution Videos
The problem of object detection and tracking has received relatively less attention in low frame rate and low resolution videos. Here we focus on motion segmentation in videos whe...
Naresh P. Cuntoor, Arslan Basharat, A. G. Amitha P...
INFOCOM
2011
IEEE
13 years 1 months ago
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd
—Opportunistic ad-hoc communication enables portable devices such as smartphones to effectively exchange information, taking advantage of their mobility and locality. The nature ...
Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannid...