Sciweavers

34 search results - page 2 / 7
» The Security Twin Peaks
Sort
View
BMCBI
2010
161views more  BMCBI 2010»
13 years 3 months ago
Application of Wavelet Packet Transform to detect genetic polymorphisms by the analysis of inter-Alu PCR patterns
Background: The analysis of Inter-Alu PCR patterns obtained from human genomic DNA samples is a promising technique for a simultaneous analysis of many genomic loci flanked by Alu...
Maurizio Cardelli, Matteo Nicoli, Armando Bazzani,...
EUROCRYPT
2008
Springer
13 years 7 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup
DAGSTUHL
2007
13 years 7 months ago
Compiler-based Software Power Peak Elimination on Smart Card Systems
Abstract. RF-powered smart cards are widely used in different application areas today. For smart cards not only performance is an important attribute, but also the power consumed ...
Matthias Grumer, Manuel Wendt, Christian Steger, R...
ICC
2007
IEEE
134views Communications» more  ICC 2007»
14 years 8 days ago
DVB Detector for Cognitive Radio
—Cognitive radio (CR) is seen as one of the revolutionary techniques for future spectrum utilization. The first and probably the most challenging task for CR is to detect/sense t...
Loo Peng Goh, Zhongding Lei, Francois P. S. Chin
IPPS
2007
IEEE
14 years 7 days ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...