This paper presents a method to implement integrated services of networked home electric appliances, which provide more convenient and comfortable living for home users. The conve...
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Abstract. This paper presents markerClock, a communication appliance embedded into a clock and designed for seniors as a simple and intuitive device. MarkerClock enhances seniorsâ€...
In this paper, we empirically evaluate fundamental design trade-offs among the most recent multicore processors and accelerator technologies. Our primary aim is to aid application...