Sciweavers

191 search results - page 1 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
COMPSEC
2002
45views more  COMPSEC 2002»
13 years 8 months ago
Differentially secure multicasting and its implementation methods
S. Holeman, G. Manimaran, James Davis, Anirban Cha...

Publication
794views
15 years 5 months ago
A Fast Implementation of The Level Set Method Without Solving Partial Differential Equations
"The level set method is popular in the numerical implementation of curve evolution, but its high computational cost is a bottleneck for real-time applications. In this report...
Yonggang Shi, William Clem Karl
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 2 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede
CN
2007
77views more  CN 2007»
13 years 8 months ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...
SCN
2008
Springer
140views Communications» more  SCN 2008»
13 years 8 months ago
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
The Multimedia Broadcast Multicast Service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved M...
Simone Teofili, Michele Di Mascolo, Cristina Basil...