Sciweavers

849 search results - page 137 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
ICMB
2005
IEEE
189views Business» more  ICMB 2005»
14 years 3 months ago
Wireless Remote Healthcare Monitoring with Motes
As the world’s aged population grows many governments are looking to remote healthcare monitoring solutions. It is certainly cheaper to keep the elderly and infirm in their own ...
Einstein Lubrin, Elaine Lawrence, Karla Felix Nava...
EUC
2005
Springer
14 years 3 months ago
ANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a...
Daeyoung Kim, Tomás López, Seongeun ...
ISI
2004
Springer
14 years 3 months ago
Generating Concept Hierarchies from Text for Intelligence Analysis
It is important to automatically extract key information from sensitive text documents for intelligence analysis. Text documents are usually unstructured and information extraction...
Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, L...
FSTTCS
2003
Springer
14 years 3 months ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
FPL
2009
Springer
105views Hardware» more  FPL 2009»
14 years 2 months ago
Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators
A silicon Physical Unclonable Function (PUF), which is a die-unique challenge-response function, is an emerging hardware primitive for secure applications. It exploits manufacturi...
Abhranil Maiti, Patrick Schaumont