Sciweavers

Share
269 search results - page 1 / 54
» Templates as Master Keys
Sort
View
CHES
2005
Springer
87views Cryptology» more  CHES 2005»
10 years 8 months ago
Templates as Master Keys
We introduce two new attacks: the single-bit template attack and the template-enhanced DPA attack. The single-bit template attack can be used very effectively to classify even sin...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Ka...
SLS
2009
Springer
235views Algorithms» more  SLS 2009»
10 years 9 months ago
EasyGenetic: A Template Metaprogramming Framework for Genetic Master-Slave Algorithms
Stefano Benedettini, Andrea Roli, Luca Di Gaspero
PERCOM
2006
ACM
11 years 2 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
10 years 7 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
INFOCOM
1997
IEEE
10 years 7 months ago
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing schemefor the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsetsof ...
Hung-Min Sun, Shiuh-Pyng Shieh
books