Sciweavers

2702 search results - page 441 / 541
» Message from the Editor
Sort
View
142
Voted
FPL
2008
Springer
105views Hardware» more  FPL 2008»
15 years 5 months ago
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confidentiality and authenticity of FPGA bitstreams. In DPR syst...
Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji T...
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 5 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
117
Voted
CAINE
2008
15 years 5 months ago
Towards Multiservice Sensor Networks
Sensor networks have been used in many applications such as health monitoring, structural monitoring, transportation networks, weather prediction, and border security. In most of ...
Rabie Ramadan, Bilal I. AlQudah
124
Voted
HCI
2007
15 years 5 months ago
Designing a Direct Manipulation HUD Interface for In-Vehicle Infotainment
This paper introduces a novel design approach for an automotive direct manipulation interface. The proposed design, as applied in a fullwindshield Head-Up Display system, aims to i...
Vassilis Charissis, Martin Naef, Stylianos Papanas...
105
Voted
HCI
2007
15 years 4 months ago
Human Communication Based on Icons in Crisis Environments
In recent years, we have developed an icon-based communication interface to represent concepts and ideas. Users can create messages to communicate with others using a spatial arran...
Siska Fitrianie, Dragos Datcu, Léon J. M. R...