Sciweavers

29 search results - page 4 / 6
» Smart Card Research Perspectives
Sort
View
CODES
2004
IEEE
14 years 10 days ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
CHI
2005
ACM
14 years 9 months ago
The virtuality continuum revisited
We survey the themes and the aims of a workshop devoted to the state-of-the-art virtuality continuum. In this continuum, ranging from fully virtual to real physical environments, ...
Anton Nijholt, David R. Traum
EDCC
2008
Springer
13 years 10 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
PR
2006
99views more  PR 2006»
13 years 8 months ago
Authenticating corrupted photo images based on noise parameter estimation
Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
Sang-Woong Lee, Ho-Choul Jung, Bon-Woo Hwang, Seon...

Publication
250views
14 years 10 months ago
Limited bus stop service: An evaluation of an implementation strategy
Transit agencies implement limited-stop (express) bus services as a mean to provide an attractive and competitive transportation mode when compared to the automobile. In 2008, the ...
El-Geneidy, A. & Surprenant-Legault, J.