Sciweavers

Share
12 search results - page 1 / 3
» icic 2010
Sort
View
ICICS
2010
Springer
11 years 10 months ago
Horizontal Correlation Analysis on Exponentiation
Christophe Clavier, Benoit Feix, Georges Gagnerot,...
ICICS
2010
Springer
11 years 10 months ago
Manger's Attack Revisited
In this work we examine a number of different open source implementations of the RSA Optimal Asymmetric Encryption Padding (OAEP) and generally RSA with respect to the message-aime...
Falko Strenzke
JSAC
2010
130views more  JSAC 2010»
11 years 6 months ago
Adaptive Spatial Intercell Interference Cancellation in Multicell Wireless Networks
Downlink spatial intercell interference cancellation (ICIC) is considered for mitigating other-cell interference using multiple transmit antennas. A principle question we explore ...
Jun Zhang, Jeffrey G. Andrews
ICICS
2010
Springer
11 years 10 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
ICICS
2010
Springer
11 years 10 months ago
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The main reason for constructing sealed-bid auction prot...
Mehrdad Nojoumian, Douglas R. Stinson
books