Sciweavers

694 search results - page 93 / 139
» The Power of the Middle Bit
Sort
View
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
15 years 29 days ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
IJNSEC
2008
119views more  IJNSEC 2008»
14 years 12 months ago
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Inspired by an old Chinese game, Go, we have designed a new graphical password scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a password. While...
Hai Tao, Carlisle Adams
TWC
2008
120views more  TWC 2008»
14 years 11 months ago
Reliable Multi-hop Routing with Cooperative Transmissions in Energy-Constrained Networks
We present a novel approach in characterizing the optimal reliable multi-hop virtual multiple-input single-output (vMISO) routing in ad hoc networks. Under a high node density regi...
Aylin Aksu, Özgür Erçetin
VLSISP
2008
132views more  VLSISP 2008»
14 years 11 months ago
Serial and Parallel FPGA-based Variable Block Size Motion Estimation Processors
H.264/AVC is the latest video coding standard adopting variable block size motion estimation (VBS-ME), quarter-pixel accuracy, motion vector prediction and multi-reference frames f...
Brian M. H. Li, Philip Heng Wai Leong
LOGCOM
2000
93views more  LOGCOM 2000»
14 years 11 months ago
The product of converse PDL and polymodal K
The product of two modal logics L1 and L2 is the modal logic determined by the class of frames of the form FG such that F and G validate L1 and L2, respectively. This paper proves...
Frank Wolter