Sciweavers

56 search results - page 11 / 12
» On the Practical Security of Inner Product Functional Encryp...
Sort
View
138
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
Bank Transfer over Quantum Channel with Digital Checks
- In recent years, many quantum cryptographic schemes have been proposed. However, it seems that there are many technical difficulties to realize them (except Quantum Key Distribut...
Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Shel...
164
Voted
TII
2010
146views Education» more  TII 2010»
14 years 10 months ago
A Flexible Design Flow for Software IP Binding in FPGA
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, develop...
Michael A. Gora, Abhranil Maiti, Patrick Schaumont
122
Voted
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 9 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
MP
2010
163views more  MP 2010»
14 years 11 months ago
Speeding up IP-based algorithms for constrained quadratic 0-1 optimization
In many practical applications, the task is to optimize a non-linear objective function over the vertices of a well-studied polytope as, e.g., the matching polytope or the travelli...
Christoph Buchheim, Frauke Liers, Marcus Oswald
IDT
2008
123views more  IDT 2008»
15 years 4 months ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais