Sciweavers

7262 search results - page 82 / 1453
» Reversible Computer Hardware
Sort
View
TAP
2008
Springer
82views Hardware» more  TAP 2008»
14 years 9 months ago
Distinctiveness of faces: A computational approach
Manuele Bicego, Enrico Grosso, Andrea Lagorio, Gav...
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 4 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
ICPPW
2002
IEEE
15 years 2 months ago
Statistical Analysis of Connectivity in Unidirectional Ad Hoc Networks
A unidirectional link exists in an ad-hoc network when a node B is within the transmission range of another node A while node A cannot directly hear node B. However, a reverse rou...
Venugopalan Ramasubramanian, Daniel Mossé
HOST
2008
IEEE
15 years 4 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
IPPS
2010
IEEE
14 years 7 months ago
Improving application performance with hardware data structures
Contemporary processors are becoming wider and more parallel. Thus developers must work hard to extract performance gains. An alternative computing paradigm is to use FPGA technolo...
Ravikesh Chandra, Oliver Sinnen