Sciweavers

1863 search results - page 73 / 373
» Load-Reuse Analysis: Design and Evaluation
Sort
View
FDTC
2008
Springer
144views Cryptology» more  FDTC 2008»
14 years 11 months ago
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems
The adaptive and active nature of fault based sidechannel attacks along with the large arsenal of fault injection methods complicates the design of effective countermeasures. To o...
Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky
ISICT
2003
14 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
WSC
2000
14 years 11 months ago
Simulation modeling and analysis of a new international terminal
This paper describes a recently completed project involving the development of simulation models for the new international terminal at Istanbul Ataturk Airport, Istanbul, Turkey. ...
Ali S. Kiran, Tekin Cetinkaya, Serafettin Og
WINET
2010
130views more  WINET 2010»
14 years 8 months ago
Performance analysis of the cumulative ARQ in IEEE 802.16 networks
In this paper, we study the performance of the cumulative Automatic Repeat reQuest (ARQ) in IEEE 802.16 networks. An analytical model is developed to investigate some important per...
Fen Hou, James She, Pin-Han Ho, Xuemin (Sherman) S...
ANCS
2009
ACM
14 years 7 months ago
Motivating future interconnects: a differential measurement analysis of PCI latency
Local interconnect architectures are at a cusp in which advances in throughput have come at the expense of power and latency. Moreover, physical limits imposed on dissipation and ...
David J. Miller, Philip M. Watts, Andrew W. Moore