Sciweavers

694 search results - page 127 / 139
» The Power of the Middle Bit
Sort
View
ICDCSW
2003
IEEE
14 years 1 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
CCS
2009
ACM
13 years 11 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 10 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
MOBICOM
2010
ACM
13 years 8 months ago
Bartendr: a practical approach to energy-aware cellular data scheduling
Cellular radios consume more power and suffer reduced data rate when the signal is weak. According to our measurements, the communication energy per bit can be as much as 6x highe...
Aaron Schulman, Vishnu Navda, Ramachandran Ramjee,...
IEICET
2007
102views more  IEICET 2007»
13 years 7 months ago
Adaptive Adjustment of Integration Time for BPSK Based Ultra-Wideband Frequency Hopping Receiver
—The frequency hopping (FH) based ultra-wideband (UWB) communication system divides its available frequency spectrum into several sub-bands, which leads to inherent disparities b...
Jin Man Kwon, Ye Hoon Lee, Nam-Soo Kim, HwangSoo L...