Sciweavers

126 search results - page 23 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 4 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
AVI
2004
13 years 8 months ago
Display space usage and window management operation comparisons between single monitor and multiple monitor users
The continuing trend toward greater processing power, larger storage, and in particular increased display surface by using multiple monitor supports increased multi-tasking by the...
Dugald Ralph Hutchings, Greg Smith, Brian Meyers, ...
GRID
2006
Springer
13 years 6 months ago
Monitoring and analysing a Grid Middleware Node
Distributed Grid applications are becoming more and more popular as the use of complex grid middlewares becomes extensive, and more facilities are offered by these complex pieces o...
Ramon Nou, Ferran Julià, David Carrera, Kev...
ICALP
2010
Springer
13 years 11 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
ECAL
1995
Springer
13 years 10 months ago
Elements of a Theory of Simulation
Arti cial Life and the more general area of Complex Systems does not have a uni ed theoretical framework although most theoretical work in these areas is based on simulation. This ...
Steen Rasmussen, Christopher L. Barrett