Sciweavers

956 search results - page 115 / 192
» Multiple Views on System Traces
Sort
View
CHES
2004
Springer
106views Cryptology» more  CHES 2004»
15 years 1 months ago
XTR Implementation on Reconfigurable Hardware
Abstract. Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents elements of F p6 with order dividing p2 -p+1 by their trace over Fp2 ....
Eric Peeters, Michael Neve, Mathieu Ciet
VISSYM
2007
15 years 14 days ago
Path Visualization for Adjacency Matrices
For displaying a dense graph, an adjacency matrix is superior than a node-link diagram because it is more compact and free of visual clutter. A node-link diagram, however, is far ...
Zeqian Shen, Kwan-Liu Ma
ESORICS
2008
Springer
14 years 11 months ago
Dismantling MIFARE Classic
The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We rev...
Flavio D. Garcia, Gerhard de Koning Gans, Ruben Mu...
ICWS
2007
IEEE
14 years 11 months ago
Capacity Management and Demand Prediction for Next Generation Data Centers
Advances in server, network, and storage virtualization are enabling the creation of resource pools of servers that permit multiple application workloads to share each server in t...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Alf...
PERVASIVE
2008
Springer
14 years 10 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...