Sciweavers

868 search results - page 2 / 174
» The EAX Mode of Operation
Sort
View
USS
2010
13 years 5 months ago
An Analysis of Private Browsing Modes in Modern Browsers
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey i...
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, D...
ISQED
2008
IEEE
109views Hardware» more  ISQED 2008»
14 years 1 months ago
Minimizing Offset for Latching Voltage-Mode Sense Amplifiers for Sub-Threshold Operation
This paper examines latch style voltage mode sense amplifiers for operation in the sub-threshold region, where VDD<VT. We show that the offset gets worse relative to strong inv...
Joseph F. Ryan, Benton H. Calhoun
IAJIT
2011
13 years 2 months ago
Evaluation for diaphragm's deflection for touch mode MEMS pressure sensors
: In this paper, an analytical and simulation solution for touch mode Micro-electromechanical systems pressure sensor operating in harsh environment is proposed. The principle of t...
Yadollah Hezarjaribi, Mohd Hamidon, Roslina Mohd S...
ICISS
2009
Springer
13 years 5 months ago
On Some Weaknesses in the Disk Encryption Schemes EME and EME2
Abstract. Tweakable enciphering schemes are a certain type of blockcipher mode of operation which provide security in the sense of a strong pseudo-random permutation. It has been p...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
CDC
2010
IEEE
150views Control Systems» more  CDC 2010»
13 years 2 months ago
An adjoint method for second-order switching time optimization
Abstract-- Switched systems evolve over a sequence of continuous modes of operation, transitioning between modes in a discrete manner. Assuming a mode sequence is known, the evolut...
Timothy M. Caldwell, Todd D. Murphey