Sciweavers

4805 search results - page 175 / 961
» On the Analysis of Indexing Schemes
Sort
View
CAGD
2007
77views more  CAGD 2007»
13 years 8 months ago
A geometric diagram and hybrid scheme for triangle subdivision
We introduce a geometrical diagram to study the improvement in shape of triangles generated by iterative application of triangle subdivision. The four Triangles Longest Edge (4TLE...
Angel Plaza, José P. Suárez, Graham ...
IJSN
2007
82views more  IJSN 2007»
13 years 8 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
ICUMT
2009
13 years 6 months ago
A new approach to the design of wireless data broadcasting systems: An analysis-based cost-effective scheme
Abstract--A new approach to the design of wireless data broadcasting systems is introduced. The proposed approach is based on the mathematical analysis of the aforementioned system...
Christos Liaskos, Sophia G. Petridou, Georgios I. ...
PERCOM
2008
ACM
14 years 8 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
14 years 2 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...