Sciweavers

859 search results - page 3 / 172
» The Changing Face of Cryptography
Sort
View
ECIS
2000
13 years 6 months ago
A Comprehensive Change Management Framework for Information Technology-Driven Change in Organisations
The implementation and use of new information technology initiate changes. These changes can be either of a technological nature (and often explicitly known), or of a social natur...
Elsje van Rooyen
PERCOM
2005
ACM
14 years 5 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
CHES
2003
Springer
114views Cryptology» more  CHES 2003»
13 years 10 months ago
True Random Number Generators Secure in a Changing Environment
A true random number generator (TRNG) usually consists of two components: an “unpredictable” source with high entropy, and a randomness extractor — a function which, when app...
Boaz Barak, Ronen Shaltiel, Eran Tromer
CHES
2004
Springer
167views Cryptology» more  CHES 2004»
13 years 11 months ago
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement a...
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eb...
AMFG
2003
IEEE
151views Biometrics» more  AMFG 2003»
13 years 10 months ago
Illumination Modeling and Normalization for Face Recognition
In this paper, we present a general framework for face modeling under varying lighting conditions. First, we show that a face lighting subspace can be constructed based on three o...
Haitao Wang, Stan Z. Li, Yangsheng Wang, Weiwei Zh...