Sciweavers

868 search results - page 32 / 174
» The EAX Mode of Operation
Sort
View
ICC
2009
IEEE
155views Communications» more  ICC 2009»
13 years 5 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
ISJGP
2010
13 years 4 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 1 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
HCI
2009
13 years 5 months ago
Mind Monitoring via Mobile Brain-Body Imaging
Current brain-computer interface (BCI) research attempts to estimate intended operator body or cursor movements from his/her electroencephalographic (EEG) activity alone. More gene...
Scott Makeig
HAPTICS
2002
IEEE
14 years 9 days ago
On Application of Virtual Fixtures as an Aid for Telemanipulation and Training
This paper presents a study on the application of virtual fixtures as a control aid for performing telemanipulation or in the training environment. The implementation features bot...
Shahram Payandeh, Zoran Stanisic