Sciweavers

2642 search results - page 45 / 529
» The development of Chez Scheme
Sort
View
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
14 years 1 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
MEDIAFORENSICS
2010
13 years 11 months ago
Audio annotation watermarking with robustness against DA/AD conversion
In the paper we present a watermarking scheme developed to meet the specific requirements of audio annotation watermarking robust against DA/AD conversion (watermark detection aft...
Kun Qian, Christian Krätzer, Michael Biermann...
SOUPS
2010
ACM
14 years 1 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
CDC
2010
IEEE
117views Control Systems» more  CDC 2010»
13 years 4 months ago
Distributed iterative regularization algorithms for monotone Nash games
In this paper, we consider the development of single-timescale schemes for the distributed computation of Nash equilibria. In general, equilibria associated with convex Nash games ...
Aswin Kannan, Uday V. Shanbhag
COMPSAC
2009
IEEE
14 years 1 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye