Sciweavers

262 search results - page 13 / 53
» MONA Implementation Secrets
Sort
View
DATE
2007
IEEE
106views Hardware» more  DATE 2007»
14 years 1 months ago
Low-cost protection for SER upsets and silicon defects
Extreme transistor scaling trends in silicon technology are soon to reach a point where manufactured systems will suffer from limited device reliability and severely reduced life...
Mojtaba Mehrara, Mona Attariyan, Smitha Shyam, Kyp...
ACMDIS
2008
ACM
13 years 9 months ago
Reflecting human behavior to motivate desirable lifestyle
Ambient lifestyle feedback systems are embedded computer systems designed to motivate changes in a person's lifestyle by reflecting an interpretation of targeted behavior bac...
Tatsuo Nakajima, Vili Lehdonvirta, Eiji Tokunaga, ...
JNW
2008
116views more  JNW 2008»
13 years 6 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
NDSS
2002
IEEE
14 years 13 days ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
14 years 8 months ago
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, mal...
Christof Paar, Lang Lin, Markus Kasper, Tim Gü...