Sciweavers

2125 search results - page 113 / 425
» Points with Type-2 Operations
Sort
View
JCP
2007
127views more  JCP 2007»
15 years 5 months ago
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem
Abstract— Side channel attacks such as Simple Power Analysis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms for elliptic curve point sc...
Andrew Byrne, Nicolas Meloni, Arnaud Tisserand, Em...
VC
2008
95views more  VC 2008»
15 years 5 months ago
High frequency geometric detail manipulation and editing for point-sampled surfaces
In this paper, based on the new definition of high frequency geometric detail for point-sampled surfaces, a new approach for detail manipulation and a detail-preserving editing fra...
Yongwei Miao, Jieqing Feng, Chunxia Xiao, Qunsheng...
CISIS
2009
IEEE
15 years 2 months ago
Lifetime in Wireless Sensor Networks
The following paper deals with criterion used to measure communication protocol efficiency in Wireless Sensor Networks. As energy is a crucial characteristic of those networks, it...
Julien Champ, Clément Saad, Anne-Elisabeth ...
B
2007
Springer
15 years 11 months ago
Augmenting B with Control Annotations
Abstract. CSP B is an integration of the process algebra Communicating Sequential Processes (CSP), and the B-Method, which enables consistent controllers to be written for B machin...
Wilson Ifill, Steve A. Schneider, Helen Treharne
CONCUR
2008
Springer
15 years 6 months ago
A Scalable and Oblivious Atomicity Assertion
Abstract. This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOAR enables to check atomicity of a single-writer multi-reader register imp...
Rachid Guerraoui, Marko Vukolic