Sciweavers

1986 search results - page 206 / 398
» constraints 2006
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
13 years 9 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
DKE
2006
138views more  DKE 2006»
13 years 8 months ago
Using the uni-level description (ULD) to support data-model interoperability
We describe a framework called the Uni-Level Description (ULD) for accurately representing information from a broad range of data models. The ULD extends previous metadata-model a...
Shawn Bowers, Lois M. L. Delcambre
CHES
2006
Springer
246views Cryptology» more  CHES 2006»
13 years 11 months ago
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
This article starts with a discussion of three different attacks on masked AES hardware implementations. This discussion leads to the conclusion that glitches in masked circuits po...
Stefan Mangard, Kai Schramm
ECTEL
2006
Springer
13 years 11 months ago
Multimedia Authoring for CoPs
One way of providing technological support for CoPs is to help participants to produce, structure and share information. As this information becomes more and more multimedia in nat...
Romain Deltour, Agnès Guerraz, Cécil...
BDA
2006
13 years 9 months ago
Capturing well typed references in DTDs
Surprisingly enough, there has been few investigations for typing references of semistructured data and XML documents. This paper build on a previous proposal [7] introducing simp...
Nicole Bidoit, Dario Colazzo