Sciweavers

125 search results - page 20 / 25
» ivs 2006
Sort
View
WIDM
2006
ACM
14 years 1 months ago
Bridging relational database history and the web: the XML approach
The preservation of digital artifacts represents an unanswered challenge for the modern information society: XML and its query languages provide an effective environment to addre...
Fusheng Wang, Xin Zhou, Carlo Zaniolo
WOWMOM
2006
ACM
84views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Measurements from an 802.11b Mobile Ad Hoc Network
This paper analyzes the characteristics of a multi-hop 802.11b mobile ad hoc network. We present data gathered from a mobile network of 20 devices carried by test users over 5 day...
Vincent Lenders, Jorg Wagner, Martin May
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
13 years 11 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
CIA
2006
Springer
13 years 11 months ago
Coverage Density as a Dominant Property of Large-Scale Sensor Networks
Large-scale sensor networks are becoming more present in our life then ever. Such an environment could be a cellular network, an array of fire detection sensors, an array of solar ...
Osher Yadgar, Sarit Kraus
EUROCRYPT
2006
Springer
13 years 11 months ago
A Provable-Security Treatment of the Key-Wrap Problem
Abstract. We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that key-wrap's goal is security in the ...
Phillip Rogaway, Thomas Shrimpton