Sciweavers

1054 search results - page 118 / 211
» Secret Communication with Feedback
Sort
View
IEEECIT
2010
IEEE
14 years 8 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
DAC
2009
ACM
14 years 7 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
CSFW
2012
IEEE
13 years 13 days ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
ICC
2009
IEEE
105views Communications» more  ICC 2009»
15 years 4 months ago
Decentralized Control and Optimization of Networks with QoS-Constrained Services
—We consider data networks in which real-time/near real-time applications require not only successful transmission of packets from source to destination, but also specific end-to...
Iraj Saniee
ICRA
2009
IEEE
147views Robotics» more  ICRA 2009»
15 years 4 months ago
Generating Robot/Agent backchannels during a storytelling experiment
Abstract— This work presents the development of a realtime framework for the research of Multimodal Feedback of Robots/Talking Agents in the context of Human Robot Interaction (H...
Sames Al Moubayed, Malek Baklouti, Mohamed Chetoua...