Sciweavers

5962 search results - page 1156 / 1193
» Working with Patterns and Code
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
ESORICS
2004
Springer
14 years 1 months ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte
EWSA
2004
Springer
14 years 1 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
ISAAC
2004
Springer
84views Algorithms» more  ISAAC 2004»
14 years 1 months ago
Property-Preserving Data Reconstruction
We initiate a new line of investigation into online property-preserving data reconstruction. Consider a dataset which is assumed to satisfy various (known) structural properties; e...
Nir Ailon, Bernard Chazelle, Seshadhri Comandur, D...
FDL
2003
IEEE
14 years 1 months ago
Object-Oriented ASIP Design and Synthesis
SystemC-Plus from the ODETTE project provides the ability to simulate and synthesise object-oriented specifications into hardware. The current ODETTE compiler translates each obj...
Maziar Goudarzi, Shaahin Hessabi, Alan Mycroft
« Prev « First page 1156 / 1193 Last » Next »