Sciweavers

2821 search results - page 79 / 565
» Tracing a single user
Sort
View
CHES
2006
Springer
74views Cryptology» more  CHES 2006»
14 years 1 months ago
Optically Enhanced Position-Locked Power Analysis
Abstract. This paper introduces a refinement of the power-analysis attack on integrated circuits. By using a laser to illuminate a specific area on the chip surface, the current th...
Sergei P. Skorobogatov
PERCOM
2005
ACM
14 years 9 months ago
Reducing the Calibration Effort for Location Estimation Using Unlabeled Samples
WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. As alternative to the wellestablished...
Xiaoyong Chai, Qiang Yang
ICMCS
2006
IEEE
94views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Evaluation of Practical Scalability of Overlay Networks in Providing Video-on-Demand Service
Recently, overlay networks have been proposed to address the problem of scalability in providing video-on-demand (VoD) service. However, from the perspective of service providing,...
Jian-Guang Luo, Yun Tang, Jiang Zhang, Shiqiang Ya...
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 9 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
IH
2009
Springer
14 years 3 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...