Sciweavers

ITNG
2006
IEEE
13 years 11 months ago
Contextual Events Framework in RFID System
Radio Frequency Identification (RFID) technology is considered to be the next step in the revolution of supplychain management, retail, and beyond. To derive real benefit from RFI...
Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom
ITNG
2006
IEEE
13 years 11 months ago
A Study on the Security of Privacy Homomorphism
Informally, Privacy Homomorphism (PH) refers to encryption schemes with a homomorphic property allowing to obtain Ek(a + b) or Ek(a × b) from ciphertexts Ek(a) and Ek(b) without ...
Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
ITNG
2006
IEEE
13 years 11 months ago
K-Selector-Based Dispatching Algorithm for Clos-Network Switches
—In this paper, we address the scheduling problem for Clos-network switches with no buffers at the central stage. Existing scheduling (dispatching) algorithms for this type of sw...
Mei Yang, Mayauna McCullough, Yingtao Jiang, Jun Z...
ITNG
2006
IEEE
13 years 11 months ago
Two-Party Private Vector Dominance: The All-Or-Nothing Deal
Alice holds a secret integer a while Bob holds a secret integer b, they want to decide on the predicate a > b with no information revealed other than the result. This is the we...
Maged Hamada Ibrahim
ITNG
2006
IEEE
13 years 11 months ago
Efficient RBS in Sensor Networks
Sensor networks have emerged as an interesting and important research area in the last few years. In order to construct a wireless sensor network, synchronization of base stations...
Hyojung Lee, Wonpil Yu, Youngmi Kwon
ITNG
2006
IEEE
13 years 11 months ago
A Study of Self-Organizing Map in Interactive Relevance Feedback
With the vast amount of potential relevant documents on the Web, a key question for a retrieval system is how to achieve a high accuracy retrieval under current Web setting. The w...
Daqing He
ITNG
2006
IEEE
13 years 11 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...
ITNG
2006
IEEE
13 years 11 months ago
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptogr
Worldwide symmetric encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and EES (Escrowed Encryption Standard), have been – and some...
Dragos Trinca
ITNG
2006
IEEE
13 years 11 months ago
Side-Channel Leakage Tolerant Architectures
Side-channel attacks compare side-channel leakage predictions or estimations with side-channel leakage measurements. The estimations are based on the exact value of a few select s...
Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede