Sciweavers

42 search results - page 3 / 9
» A Verifiable and Detectable Secret Sharing Scheme by Using a...
Sort
View
ET
2010
89views more  ET 2010»
13 years 3 months ago
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited at...
Berndt M. Gammel, Stefan Mangard
PCM
2004
Springer
91views Multimedia» more  PCM 2004»
13 years 10 months ago
A Rapid Scheme for Slow-Motion Replay Segment Detection
Abstract. Efficient data mining for digital video has become increasingly important in recent years. In this paper, we present a new scheme for automatic detection of slow-motion r...
Wei-Hong Chuang, Dun-Yu Hsiao, Soo-Chang Pei, Home...
CCS
2006
ACM
13 years 9 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
ICPPW
2009
IEEE
13 years 12 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
ICRA
2006
IEEE
276views Robotics» more  ICRA 2006»
13 years 11 months ago
Feature Extraction from Laser Scan Data based on Curvature Estimation for Mobile Robotics
— This paper presents a geometrical feature detection system to use with conventional 2D laser rangefinders. This system consists of three main modules: data acquisition and pre...
Pedro Núñez, Ricardo Vázquez ...