Sciweavers

83 search results - page 17 / 17
» Conformon-P Systems with Negative Values
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
13 years 11 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ITC
1998
IEEE
94views Hardware» more  ITC 1998»
13 years 10 months ago
A method of serial data jitter analysis using one-shot time interval measurements
A method for measuring inter-symbol interference, duty cycle distortion, random jitter and periodic jitter is described. The Blackman-Tukey method of signal analysis is used. This...
Jan B. Wilstrup
BMCBI
2005
90views more  BMCBI 2005»
13 years 6 months ago
TMB-Hunt: An amino acid composition based method to screen proteomes for beta-barrel transmembrane proteins
Background: Beta-barrel transmembrane (bbtm) proteins are a functionally important and diverse group of proteins expressed in the outer membranes of bacteria (both gram negative a...
Andrew G. Garrow, Alison Agnew, David R. Westhead