Sciweavers

894 search results - page 92 / 179
» Secure Implementation of Channel Abstractions
Sort
View
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 3 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 10 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
TWC
2008
143views more  TWC 2008»
13 years 10 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
IJCNN
2008
IEEE
14 years 4 months ago
Large developing axonal arbors using a distributed and locally-reprogrammable address-event receiver
Abstract— We have designed a distributed and locally reprogrammable address event receiver. Incoming address-events are monitored simultaneously by all synapses, allowing for arb...
Simeon A. Bamford, Alan F. Murray, David J. Willsh...
AMR
2005
Springer
158views Multimedia» more  AMR 2005»
14 years 4 days ago
Exploring the Structure of Media Stream Interactions for Multimedia Browsing
Abstract. This paper presents an approach to the issue of adding structure to recordings of collaborative meetings supported by an audio channel and a shared text editor. The virtu...
Saturnino Luz, Matt-Mouley Bouamrane