Sciweavers

54 search results - page 11 / 11
» The role of channel states in secret key generation
Sort
View
PERCOM
2008
ACM
14 years 3 months ago
Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor Networks
Wireless sensor networks are commonly used to monitor and control the physical world. To provide a meaningful service such as disaster and emergency surveillance, meeting real-tim...
Muhammad Farukh Munir, Arzad Alam Kherani, Fethi F...
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
13 years 8 months ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
GLOBECOM
2009
IEEE
13 years 11 months ago
On the Performance Gains of VoIP Aggregation and ROHC over a WirelessMAN-OFDMA Air Interface
—A growing number of mobile WiMAX deployments are in progress world-wide and the technology is anticipated to play a key role in next generation mobile broadband wireless network...
Jarno Pinola, Esa Piri, Kostas Pentikousis
CHI
2010
ACM
13 years 9 months ago
Brain, body and bytes: psychophysiological user interaction
The human brain and body are prolific signal generators. Recent technologies and computing techniques allow us to measure, process and interpret these signals. We can now infer su...
Audrey Girouard, Erin Treacy Solovey, Regan L. Man...