Sciweavers

924 search results - page 133 / 185
» Teaching simulation using case studies
Sort
View
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
14 years 3 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
MST
2011
200views Hardware» more  MST 2011»
14 years 6 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 6 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
ESAW
2009
Springer
15 years 6 months ago
Determining the Trustworthiness of New Electronic Contracts
Expressing contractual agreements electronically potentially allows agents to automatically perform functions surrounding contract use: establishment, fulfilment, renegotiation et...
Paul T. Groth, Simon Miles, Sanjay Modgil, Nir Ore...
ISCC
2006
IEEE
134views Communications» more  ISCC 2006»
15 years 5 months ago
A Proposed Framework for Calibration of Available Bandwidth Estimation Tools
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...
Joel Sommers, Paul Barford, Walter Willinger