Sciweavers

125 search results - page 20 / 25
» iv 2006
Sort
View
WIDM
2006
ACM
15 years 10 months ago
Bridging relational database history and the web: the XML approach
The preservation of digital artifacts represents an unanswered challenge for the modern information society: XML and its query languages provide an effective environment to addre...
Fusheng Wang, Xin Zhou, Carlo Zaniolo
WOWMOM
2006
ACM
84views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Measurements from an 802.11b Mobile Ad Hoc Network
This paper analyzes the characteristics of a multi-hop 802.11b mobile ad hoc network. We present data gathered from a mobile network of 20 devices carried by test users over 5 day...
Vincent Lenders, Jorg Wagner, Martin May
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 7 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
CIA
2006
Springer
15 years 7 months ago
Coverage Density as a Dominant Property of Large-Scale Sensor Networks
Large-scale sensor networks are becoming more present in our life then ever. Such an environment could be a cellular network, an array of fire detection sensors, an array of solar ...
Osher Yadgar, Sarit Kraus
EUROCRYPT
2006
Springer
15 years 7 months ago
A Provable-Security Treatment of the Key-Wrap Problem
Abstract. We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that key-wrap's goal is security in the ...
Phillip Rogaway, Thomas Shrimpton