Sciweavers

496 search results - page 1 / 100
» Implementing the TEA algorithm on sensors
Sort
View
ACMSE
2004
ACM
13 years 10 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
JAISE
2010
88views Algorithms» more  JAISE 2010»
12 years 11 months ago
Improving user verification by implementing an agent-based security system
Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
PERVASIVE
2006
Springer
13 years 4 months ago
The Diet-Aware Dining Table: Observing Dietary Behaviors over a Tabletop Surface
We are what we eat. Our everyday food choices affect our long-term and short-term health. In the traditional health care, professionals assess and weigh each individual's diet...
Keng-hao Chang, Shih-yen Liu, Hao-Hua Chu, Jane Yu...
IAT
2009
IEEE
13 years 11 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
LPAR
2005
Springer
13 years 10 months ago
Functional Correctness Proofs of Encryption Algorithms
Abstract. We discuss a collection of mechanized formal proofs of symmetric key block encryption algorithms (AES, MARS, Twofish, RC6, Serpent, IDEA, and TEA), performed in an imple...
Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, K...