Sciweavers

83 search results - page 17 / 17
» Conformon-P Systems with Negative Values
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 3 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ITC
1998
IEEE
94views Hardware» more  ITC 1998»
14 years 2 months ago
A method of serial data jitter analysis using one-shot time interval measurements
A method for measuring inter-symbol interference, duty cycle distortion, random jitter and periodic jitter is described. The Blackman-Tukey method of signal analysis is used. This...
Jan B. Wilstrup
BMCBI
2005
90views more  BMCBI 2005»
13 years 9 months ago
TMB-Hunt: An amino acid composition based method to screen proteomes for beta-barrel transmembrane proteins
Background: Beta-barrel transmembrane (bbtm) proteins are a functionally important and diverse group of proteins expressed in the outer membranes of bacteria (both gram negative a...
Andrew G. Garrow, Alison Agnew, David R. Westhead