Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practical...
Vassilios Chrissikopoulos, George Papaloukopoulos,...
Abstract. Brain computer interfaces (BCI) that use the steady-statevisual-evoked-potential (SSVEP) as neural source, offer two main advantages over other types of BCIs: shorter ca...
Danhua Zhu, Gary Garcia Molina, Vojkan Mihajlovic,...
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...