Sciweavers

694 search results - page 93 / 139
» The Power of the Middle Bit
Sort
View
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
13 years 9 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
IJNSEC
2008
119views more  IJNSEC 2008»
13 years 8 months ago
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Inspired by an old Chinese game, Go, we have designed a new graphical password scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a password. While...
Hai Tao, Carlisle Adams
TWC
2008
120views more  TWC 2008»
13 years 7 months ago
Reliable Multi-hop Routing with Cooperative Transmissions in Energy-Constrained Networks
We present a novel approach in characterizing the optimal reliable multi-hop virtual multiple-input single-output (vMISO) routing in ad hoc networks. Under a high node density regi...
Aylin Aksu, Özgür Erçetin
VLSISP
2008
132views more  VLSISP 2008»
13 years 7 months ago
Serial and Parallel FPGA-based Variable Block Size Motion Estimation Processors
H.264/AVC is the latest video coding standard adopting variable block size motion estimation (VBS-ME), quarter-pixel accuracy, motion vector prediction and multi-reference frames f...
Brian M. H. Li, Philip Heng Wai Leong
LOGCOM
2000
93views more  LOGCOM 2000»
13 years 7 months ago
The product of converse PDL and polymodal K
The product of two modal logics L1 and L2 is the modal logic determined by the class of frames of the form FG such that F and G validate L1 and L2, respectively. This paper proves...
Frank Wolter