Sciweavers

1653 search results - page 258 / 331
» Timed analysis of security protocols
Sort
View
HICSS
2010
IEEE
142views Biometrics» more  HICSS 2010»
14 years 3 months ago
DQ Tags and Decision-Making
It has been suggested that metadata describing data quality (DQ), termed DQ tags, be made available in situations where decision-makers are unfamiliar with the data context, for e...
Rosanne Price, Graeme G. Shanks
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
14 years 3 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
ATVA
2006
Springer
106views Hardware» more  ATVA 2006»
14 years 19 days ago
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains
Motivated by recent applications of pushdown systems to computer security problems, we present an efficient algorithm for the reachability problem of alternating pushdown systems. ...
Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier E...
MM
2009
ACM
163views Multimedia» more  MM 2009»
14 years 3 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...