Sciweavers

1834 search results - page 272 / 367
» Public Key Cryptography
Sort
View
ISOLA
2010
Springer
13 years 6 months ago
A Case Study in Model-Based Adaptation of Web Services
Abstract. Developing systems through the composition of reusable software services is not straightforward in most situations since different kinds of mismatch may occur among their...
Javier Cámara, José Antonio Mart&iac...
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 6 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
GIS
2010
ACM
13 years 5 months ago
Moving forward: location privacy and location awareness
ended abstract looks forward at which shared concepts and approaches are shaping future research in the field of location privacy, as well as reflecting on the broader achievement...
Matt Duckham
CIMAGING
2009
94views Hardware» more  CIMAGING 2009»
13 years 5 months ago
Iterative demosaicking accelerated: theory and fast noniterative implementations
Color image demosaicking is a key process in the digital imaging pipeline. In this paper, we present a rigorous treatment of a classical demosaicking algorithm based on alternatin...
Yue M. Lu, Mina Karzand, Martin Vetterli
CSREASAM
2009
13 years 5 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong