Sciweavers

894 search results - page 44 / 179
» Secure Implementation of Channel Abstractions
Sort
View
ISADS
1999
IEEE
14 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CCS
2006
ACM
14 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
ICC
2007
IEEE
172views Communications» more  ICC 2007»
14 years 4 months ago
Performance Analysis of Cooperative Diversity Using Equal Gain Combining (EGC) Technique Over Rayleigh Fading Channels
Abstract— Cooperative diversiy is a promising technology for future wireless networks. In this paper, based on the moment generating function (MGF), we derive exact closed-form e...
Salama Ikki, Mohamed H. Ahmed
AES
2004
Springer
190views Cryptology» more  AES 2004»
14 years 3 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
CORR
2007
Springer
78views Education» more  CORR 2007»
13 years 10 months ago
Power Allocation for Discrete-Input Non-Ergodic Block-Fading Channels
Abstract— We consider power allocation algorithms for fixedrate transmission over Nakagami-m non-ergodic block-fading channels with perfect transmitter and receiver channel stat...
Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K....