Sciweavers

126 search results - page 21 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
MVA
1990
170views Computer Vision» more  MVA 1990»
13 years 7 months ago
Automatic Fire Detection by Changing Region Analysis Based on Geographic Information
This paper proposes a new method for automatic fire detection in cities using image processing techniques. Images are obtained successively at regular intervals from monochrome TV...
Hideo Numagami, Akio Okazaki
COMPSAC
2009
IEEE
13 years 11 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
DCC
2005
IEEE
14 years 6 months ago
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Elliptic curve cryptosystems in the presence of faults were studied by Biehl, Meyer and M?uller (2000). The first fault model they consider requires that the input point P in the c...
Mathieu Ciet, Marc Joye
DSN
2011
IEEE
12 years 6 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
13 years 11 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart