Sciweavers

1369 search results - page 130 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ESORICS
2009
Springer
15 years 6 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
ISCAS
2007
IEEE
120views Hardware» more  ISCAS 2007»
15 years 5 months ago
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure
— We propose Differential Power Analysis (DPA) with a phase-based waveform matching technique. Conventionally, a trigger signal and a system clock are used to capture the wavefor...
Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafum...
PDCAT
2005
Springer
15 years 4 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
DCC
2008
IEEE
15 years 10 months ago
Sublinear Recovery of Sparse Wavelet Signals
There are two main classes of decoding algorithms for "compressed sensing," those which run time time polynomial in the signal length and those which use sublinear resou...
Ray Maleh, Anna C. Gilbert
ICASSP
2008
IEEE
15 years 5 months ago
The probability of near midair collisions using level-crossings
We consider probabilistic methods to compute the near midair collision risk using state estimate and covariance from a target tracking filter based on angle-only sensors such as ...
Per-Johan Nordlund, Fredrik Gustafsson