Sciweavers

317 search results - page 35 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
15 years 10 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
ICMCS
1999
IEEE
122views Multimedia» more  ICMCS 1999»
15 years 2 months ago
Tailored Transmissions for Efficient Near-Video-on-Demand Service
Near-Video-On-Demand (NVOD) entails the provision of viewing flexibility that approaches that of VOD to an unlimited number of viewers of a "hot" movie at afixed cost to...
Yitzhak Birk, Ron Mondri
ETT
2007
90views Education» more  ETT 2007»
14 years 9 months ago
Algorithms and applications of channel impulse response length estimation for MIMO-OFDM
Abstract— The performance of the widely applied timedomain channel estimation for SISO- and MIMO-OFDM systems strongly depends on the preciseness of information regarding maximum...
Marco Krondorf, Ting-Jung Liang, M. Goblirsch, Ger...
SUTC
2006
IEEE
15 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICC
1997
IEEE
133views Communications» more  ICC 1997»
15 years 1 months ago
MESH: Distributed Error Recovery for Multimedia Streams in Wide-Area Multicast Networks
This paper addresses support for nzulti-party multimedia applications delivered across datagram wide-area networks such as the Internet. Our approach is to develop a novel retrans...
Matthew T. Lucas, Bert J. Dempsey, Alfred C. Weave...