Sciweavers

840 search results - page 129 / 168
» Universal Metadata Standard
Sort
View
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
14 years 3 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
CCS
2007
ACM
14 years 3 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
CONEXT
2006
ACM
14 years 3 months ago
A WSN platform to support middleware development
According to the application domain, Wireless Sensor Networks (WSNs) differ in a number of ways (e. g., deployment strategy, node mobility, available resources, node heterogeneity...
André Rodrigues
W4A
2006
ACM
14 years 3 months ago
Mobile phones may be the right devices for supporting developing world accessibility, but is the WWW the right service delivery
In this paper we detail the synergies we have observed between the features and limitations of mobile phones, and the usability and accessibility requirements of rural developing ...
Tapan S. Parikh
FCCM
2005
IEEE
107views VLSI» more  FCCM 2005»
14 years 2 months ago
Simplifying the Integration of Processing Elements in Computing Systems Using a Programmable Controller
As technology sizes decrease and die area increases, designers are creating increasingly complex computing systems using FPGAs. To reduce design time for new products, the reuse o...
Lesley Shannon, Paul Chow