Sciweavers

1898 search results - page 24 / 380
» Weak Keys for IDEA
Sort
View
PERCOM
2007
ACM
13 years 8 months ago
GSM indoor localization
Accurate indoor localization has long been an objective of the ubiquitous computing research community, and numerous indoor localization solutions based on 802.11, Bluetooth, ultra...
Alex Varshavsky, Eyal de Lara, Jeffrey Hightower, ...
ICCV
2009
IEEE
13 years 6 months ago
Attached shadow coding: Estimating surface normals from shadows under unknown reflectance and lighting conditions
We present a novel technique, termed attached shadow coding, for estimating surface normals from shadows when the reflectance and lighting conditions are unknown. Our key idea is ...
Takahiro Okabe, Imari Sato, Yoichi Sato
JCAL
2010
152views more  JCAL 2010»
13 years 3 months ago
Micro-adaptivity: protecting immersion in didactically adaptive digital educational games
The idea of utilizing the rich potential of today's computer games for educational purposes excites educators, scientists and technicians. Despite the significant hype over di...
Michael D. Kickmeier-Rust, Dietrich Albert
IACR
2011
104views more  IACR 2011»
12 years 8 months ago
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere
PRINTcipher is a recent lightweight block cipher designed by Knudsen et al. Some noteworthy characteristics are a burnt-in key, a key-dependent permutation layer and identical roun...
Martin Ågren, Thomas Johansson
PIMRC
2010
IEEE
13 years 6 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener