Sciweavers

1653 search results - page 256 / 331
» Timed analysis of security protocols
Sort
View
EUROCRYPT
2003
Springer
14 years 2 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
MICCAI
2007
Springer
14 years 9 months ago
Quantification of Measurement Error in DTI: Theoretical Predictions and Validation
The presence of Rician noise in magnetic resonance imaging (MRI) introduces systematic errors in diffusion tensor imaging (DTI) measurements. This paper evaluates gradient directio...
Casey Goodlett, P. Thomas Fletcher, Weili Lin, Gui...
PERCOM
2008
ACM
14 years 8 months ago
Cardinality Estimation for Large-scale RFID Systems
Counting or estimating the number of tags is crucial for large-scale RFID systems. The use of multiple readers was recently proposed to improve the efficiency and effectiveness in ...
Chen Qian, Hoilun Ngan, Yunhao Liu
DAC
2005
ACM
14 years 9 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 3 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong