Sciweavers

12 search results - page 1 / 3
» icics 2010
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Horizontal Correlation Analysis on Exponentiation
Christophe Clavier, Benoit Feix, Georges Gagnerot,...
ICICS
2010
Springer
13 years 5 months ago
Manger's Attack Revisited
In this work we examine a number of different open source implementations of the RSA Optimal Asymmetric Encryption Padding (OAEP) and generally RSA with respect to the message-aime...
Falko Strenzke
JSAC
2010
130views more  JSAC 2010»
13 years 2 months ago
Adaptive Spatial Intercell Interference Cancellation in Multicell Wireless Networks
Downlink spatial intercell interference cancellation (ICIC) is considered for mitigating other-cell interference using multiple transmit antennas. A principle question we explore ...
Jun Zhang, Jeffrey G. Andrews
ICICS
2010
Springer
13 years 5 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
ICICS
2010
Springer
13 years 5 months ago
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The main reason for constructing sealed-bid auction prot...
Mehrdad Nojoumian, Douglas R. Stinson