Sciweavers

2108 search results - page 261 / 422
» Encrypted
Sort
View
MUE
2007
IEEE
100views Multimedia» more  MUE 2007»
15 years 10 months ago
Pave the Way to Future Smart Living Space - Cross-layer Enhanced AAA for 4G Core Network
The 4th generation mobile communication system certainly will have a lot of improvement such as supporting higher multimedia loading, offering faster transmission rate, and the im...
Tin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh C...
SAINT
2007
IEEE
15 years 10 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
15 years 10 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
WETICE
2007
IEEE
15 years 10 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi
CHES
2007
Springer
105views Cryptology» more  CHES 2007»
15 years 10 months ago
On the Implementation of a Fast Prime Generation Algorithm
Abstract. A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we ...
Christophe Clavier, Jean-Sébastien Coron