Sciweavers

759 search results - page 46 / 152
» What Can Be Implemented Anonymously
Sort
View
TKDE
2010
159views more  TKDE 2010»
13 years 8 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
CALCO
2007
Springer
202views Mathematics» more  CALCO 2007»
14 years 4 months ago
Algebraic Models of Simultaneous Multithreaded and Multi-core Processors
Much current work on modelling and verifying microprocessors can accommodate pipelined and superscalar processors. However, superscalar and pipelined processors are no longer state...
Neal A. Harman
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
14 years 1 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 4 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
IJCNN
2006
IEEE
14 years 4 months ago
Modeling Cortical Maps with Feed-Backs
Abstract— High-level specification of how the brain represents and categorizes the causes of its sensory input allows to link “what is to be done” (perceptual task) with “...
Thierry Viéville, Pierre Kornprobst