Sciweavers

3073 search results - page 22 / 615
» Real World Verification
Sort
View
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
13 years 9 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
MVA
1990
150views Computer Vision» more  MVA 1990»
13 years 8 months ago
Image Sequence Analysis of Real World Human Body Motion
In this paper attempts have been focused o n using window-tracking technlque to analyse human body movement.According to the behavlor of human vision systen,an Idea of rough and p...
Xin Zhou, Qing Lu, Zhe Gu
GLOBECOM
2009
IEEE
14 years 2 months ago
Real-World VANET Security Protocol Performance
—Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input tra...
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux
COMPLEX
2009
Springer
14 years 2 months ago
Characterizing the Structural Complexity of Real-World Complex Networks
Although recent research has shown that the complexity of a network depends on its structural organization, which is linked to the functional constraints the network must satisfy, ...
Jun Wang, Gregory M. Provan
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 1 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis