Sciweavers

766 search results - page 88 / 154
» How to Read a Signature
Sort
View
CHES
2008
Springer
146views Cryptology» more  CHES 2008»
13 years 11 months ago
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead...
Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhe...
COMAD
2008
13 years 10 months ago
Exploiting Asynchronous IO using the Asynchronous Iterator Model
Asynchronous IO (AIO) allows a process to continue to do other work while an IO operation initiated earlier completes. AIO allows a large number of random IO operations to be issu...
Suresh Iyengar, S. Sudarshan, Santosh Kumar 0002, ...
SEC
2008
13 years 10 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
IASTEDSEA
2004
13 years 10 months ago
An empirical investigation for different sequences of pedagogical framework documentation in RAD
Frameworks are increasingly employed as a useful way to enable object-oriented reuse. However, their size and complexity make understanding how to use them difficult. Previous wor...
Sin Ban Ho, Ian Chai, Chuie Hong Tan
GEOINFO
2003
13 years 10 months ago
Efficient Query Processing on the Relational Quadtree
Relational index structures, as for instance the Relational Interval Tree, the Relational R-Tree, or the Linear Quadtree, support efficient processing of queries on top of existing...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...