Sciweavers

1085 search results - page 154 / 217
» A Timing Attack on RC5
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
15 years 4 months ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
15 years 4 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
ICCBR
2009
Springer
15 years 4 months ago
Spatial Event Prediction by Combining Value Function Approximation and Case-Based Reasoning
This paper presents a new approach for spatial event prediction that combines a value function approximation algorithm and case-based reasoning predictors. Each of these predictors...
Hua Li, Héctor Muñoz-Avila, Diane Br...
ICASSP
2008
IEEE
15 years 4 months ago
An audio watermarking method based on molecular matching pursuit
In this paper we introduce a new watermarking model combining a joint time frequency (TF) representation using the molecular matching pursuit (MMP) algorithm and a psychoacoustic ...
Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana
INFOCOM
2008
IEEE
15 years 4 months ago
A Trust and Reputation based Anti-SPIM Method
—Instant Messaging (IM) service is a killer application in the Internet. Due to the problem of IM spam (SPIM), building an effective anti-spim method is an important research top...
Jun Bi, Jianping Wu, Wenmao Zhang