Sciweavers

5599 search results - page 893 / 1120
» Abstract State Services
Sort
View
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
15 years 7 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
146
Voted
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
15 years 7 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
MCS
2010
Springer
15 years 7 months ago
A Multi-Classifier System for Off-Line Signature Verification Based on Dissimilarity Representation
Abstract. Although widely used to reduce error rates of difficult pattern recognition problems, multiple classifier systems are not in widespread use in off-line signature verifica...
Luana Batista, Eric Granger, Robert Sabourin
CONCUR
2008
Springer
15 years 6 months ago
A Scalable and Oblivious Atomicity Assertion
Abstract. This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOAR enables to check atomicity of a single-writer multi-reader register imp...
Rachid Guerraoui, Marko Vukolic
CONEXT
2008
ACM
15 years 6 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...