Sciweavers

1627 search results - page 252 / 326
» High Security Smartcards
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
16 years 16 days ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
126
Voted
ICCD
2006
IEEE
132views Hardware» more  ICCD 2006»
16 years 16 days ago
FPGA-based Design of a Large Moduli Multiplier for Public Key Cryptographic Systems
— High secure cryptographic systems require large bit-length encryption keys which presents a challenge to their efficient hardware implementation especially in embedded devices...
Osama Al-Khaleel, Christos A. Papachristou, Franci...
134
Voted
CHI
2010
ACM
15 years 10 months ago
Deliberate interactions: characterizing technology use in Nairobi, Kenya
We present results from a qualitative study examining how professionals living and working in Nairobi, Kenya regularly use ICT in their everyday lives. There are two contributions...
Susan Wyche, Thomas N. Smyth, Marshini Chetty, Pau...
AFRICACRYPT
2010
Springer
15 years 10 months ago
Avoiding Full Extension Field Arithmetic in Pairing Computations
Abstract. The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of ...
Craig Costello, Colin Boyd, Juan Manuel Gonz&aacut...
125
Voted
ICDCN
2010
Springer
15 years 10 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee