Sciweavers

2162 search results - page 336 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 3 months ago
Improving the Security of Dual-Rail Circuits
Dual-rail encoding, return-to-spacer protocol and hazard-free logic can be used to resist differential power analysis attacks by making the power consumption independent of process...
Danil Sokolov, Julian Murphy, Alexandre V. Bystrov...
CIA
2004
Springer
15 years 3 months ago
Towards Monitoring of Group Interactions and Social Roles via Overhearing
We are investigating how to provide intelligent, pervasive support of group of people within so-called “smart environments”. Our current main assumption, based on literature in...
Silvia Rossi, Paolo Busetta
E4MAS
2004
Springer
15 years 3 months ago
Supporting Context-Aware Interaction in Dynamic Multi-agent Systems
The increasing ubiquity of mobile computing devices has made mobile ad hoc networks an everyday occurrence. Applications in these networks are commonly structured as a logical netw...
Christine Julien, Gruia-Catalin Roman
INFOCOM
2003
IEEE
15 years 3 months ago
Optimizing Route-Cache Lifetime in Ad Hoc Networks
—On-demand routing reduces the control overhead in mobile ad hoc networks, but it has the major drawback of introducing latency between route-request arrival and the determinatio...
Ben Liang, Zygmunt J. Haas
MSWIM
2003
ACM
15 years 3 months ago
Modeling multicast packet losses in wireless LANs
— The characteristics of wireless packet loss have been studied extensively. Most efforts focus on the temporal loss characteristics at individual stations. For multicast protoco...
Chiping Tang, Philip K. McKinley