Sciweavers

905 search results - page 109 / 181
» The Case Against Micropayments
Sort
View
MUM
2004
ACM
99views Multimedia» more  MUM 2004»
14 years 2 months ago
The Road Rager: making use of traffic encounters in a mobile multiplayer game
We present Road Rager, a prototype built in order to explore our hypothesis that proximity and a possibility to identify other players during temporary encounters could spur socia...
Liselott Brunnberg
SAC
2004
ACM
14 years 2 months ago
Solving the error correcting code problem with parallel hybrid heuristics
Some telecommunication systems can not afford the cost of repeating a corrupted message. Instead, the message should be somewhat “corrected” by the receiver. In these cases a...
Enrique Alba, J. Francisco Chicano
SIGCOMM
2004
ACM
14 years 2 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
CARDIS
2004
Springer
97views Hardware» more  CARDIS 2004»
14 years 2 months ago
On the Security of the DeKaRT Primitive
DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as buildin...
Gilles Piret, François-Xavier Standaert, Ga...
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 2 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...