Sciweavers

868 search results - page 2 / 174
» The EAX Mode of Operation
Sort
View
USS
2010
13 years 4 months ago
An Analysis of Private Browsing Modes in Modern Browsers
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey i...
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, D...
ISQED
2008
IEEE
109views Hardware» more  ISQED 2008»
14 years 25 days ago
Minimizing Offset for Latching Voltage-Mode Sense Amplifiers for Sub-Threshold Operation
This paper examines latch style voltage mode sense amplifiers for operation in the sub-threshold region, where VDD<VT. We show that the offset gets worse relative to strong inv...
Joseph F. Ryan, Benton H. Calhoun
IAJIT
2011
13 years 1 months ago
Evaluation for diaphragm's deflection for touch mode MEMS pressure sensors
: In this paper, an analytical and simulation solution for touch mode Micro-electromechanical systems pressure sensor operating in harsh environment is proposed. The principle of t...
Yadollah Hezarjaribi, Mohd Hamidon, Roslina Mohd S...
ICISS
2009
Springer
13 years 4 months ago
On Some Weaknesses in the Disk Encryption Schemes EME and EME2
Abstract. Tweakable enciphering schemes are a certain type of blockcipher mode of operation which provide security in the sense of a strong pseudo-random permutation. It has been p...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
CDC
2010
IEEE
150views Control Systems» more  CDC 2010»
13 years 1 months ago
An adjoint method for second-order switching time optimization
Abstract-- Switched systems evolve over a sequence of continuous modes of operation, transitioning between modes in a discrete manner. Assuming a mode sequence is known, the evolut...
Timothy M. Caldwell, Todd D. Murphey