Sciweavers

123 search results - page 24 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
CORR
2008
Springer
113views Education» more  CORR 2008»
13 years 7 months ago
Co-ordinate Interleaved Distributed Space-Time Coding for Two-Antenna-Relays Networks
Distributed space time coding for wireless relay networks when the source, the destination and the relays have multiple antennas have been studied by Jing and Hassibi. In this set-...
Jagadeesh Harshan, B. Sundar Rajan
CIC
2006
101views Communications» more  CIC 2006»
13 years 8 months ago
Non Blocking OVSF Codes Influence The Performance Of WCDMA System
In this paper the performance of OVSF and NOVSF codes in WCDMA are evaluated by calculating their blocking probability and plotting graphs between blocking probability and new call...
Shailendra Mishra, Nipur
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 7 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 1 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
ECCV
2006
Springer
14 years 9 months ago
Robust Attentive Behavior Detection by Non-linear Head Pose Embedding and Estimation
We present a new scheme to robustly detect a type of human attentive behavior, which we call frequent change in focus of attention (FCFA), from video sequences. FCFA behavior can b...
Nan Hu, Weimin Huang, Surendra Ranganath