Sciweavers

319 search results - page 22 / 64
» Controlled Secret Leakage
Sort
View
UCS
2007
Springer
14 years 2 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 6 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
DATE
2010
IEEE
145views Hardware» more  DATE 2010»
14 years 9 days ago
Energy-efficient real-time task scheduling with temperature-dependent leakage
Abstract--Leakage power consumption contributes significantly to the overall power dissipation for systems that are manufactured in advanced deep sub-micron technology. Different f...
Chuan-Yue Yang, Jian-Jia Chen, Lothar Thiele, Tei-...
CIKM
2005
Springer
14 years 1 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
HRI
2009
ACM
14 years 19 days ago
Nonverbal leakage in robots: communication of intentions through seemingly unintentional behavior
Human communication involves a number of nonverbal cues that are seemingly unintentional, unconscious, and automatic—both in their production and perception—and convey rich in...
Bilge Mutlu, Fumitaka Yamaoka, Takayuki Kanda, Hir...