Sciweavers

168 search results - page 24 / 34
» Statistics and Secret Leakage
Sort
View
ENTCS
2007
89views more  ENTCS 2007»
13 years 7 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang
TIFS
2008
133views more  TIFS 2008»
13 years 7 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
VLSID
2008
IEEE
153views VLSI» more  VLSID 2008»
14 years 7 months ago
Total Power Minimization in Glitch-Free CMOS Circuits Considering Process Variation
Compared to subthreshold leakage, dynamic power is normally much less sensitive to the process variation due to its approximately linear relation to the process parameters. Howeve...
Yuanlin Lu, Vishwani D. Agrawal
ICIP
2003
IEEE
14 years 9 months ago
Analysis and classification of internal pipeline images
Recently developed optical inspection tools provide images from the inside of natural gas pipelines to monitor pipeline integrity. The vast amounts of data generated prohibits hum...
Deirdre B. O'Brien, Maya R. Gupta, Robert M. Gray,...
VLSID
2007
IEEE
131views VLSI» more  VLSID 2007»
14 years 7 months ago
Probabilistic Self-Adaptation of Nanoscale CMOS Circuits: Yield Maximization under Increased Intra-Die Variations
As technology scales to 40nm and beyond, intra-die process variability will cause large delay and leakage variations across a chip in addition to expected die-to-die variations. I...
Maryam Ashouei, Muhammad Mudassar Nisar, Abhijit C...