Sciweavers

1619 search results - page 302 / 324
» Important Moments in Systems and Control
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 3 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
ICDE
2000
IEEE
197views Database» more  ICDE 2000»
14 years 10 months ago
SQLServer for Windows CE - A Database Engine for Mobile and Embedded Platforms
This paper presents an overview of Microsoft SQLServer for Windows CE. This is a database engine designed for mobile and embedded applications. The focus of the presentation is on...
Praveen Seshadri, Phil Garrett
SIGOPSE
2004
ACM
14 years 2 months ago
Defending against eclipse attacks on overlay networks
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
Atul Singh, Miguel Castro, Peter Druschel, Antony ...
MOBICOM
2003
ACM
14 years 1 months ago
MiSer: an optimal low-energy transmission strategy for IEEE 802.11a/h
Reducing the energy consumption by wireless communication devices is perhaps the most important issue in the widely-deployed and exponentially-growing IEEE 802.11 Wireless LANs (W...
Daji Qiao, Sunghyun Choi, Amit Jain, Kang G. Shin
MAS
1998
Springer
145views Communications» more  MAS 1998»
14 years 26 days ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith