Sciweavers

8933 search results - page 112 / 1787
» Usability over time
Sort
View
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
16 years 1 days ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay
ISSAC
2009
Springer
269views Mathematics» more  ISSAC 2009»
16 years 1 days ago
On factorization of multivariate polynomials over algebraic number and function fields
We present an efficient algorithm for factoring a multivariate polynomial f ∈ L[x1, . . . , xv] where L is an algebraic function field with k ≥ 0 parameters t1, . . . , tk an...
Seyed Mohammad Mahdi Javadi, Michael B. Monagan
CDC
2008
IEEE
15 years 12 months ago
On event-triggered and self-triggered control over sensor/actuator networks
— Event-triggered and self-triggered control have been recently proposed as an alternative to the more traditional periodic execution of control tasks. The possibility of reducin...
Manuel Mazo Jr., Paulo Tabuada
DATE
2008
IEEE
116views Hardware» more  DATE 2008»
15 years 12 months ago
A Virtual Prototype for Bluetooth over Ultra Wide Band System Level Design
The industry is merging two different Wireless Personal Area Networks (WPAN) technologies: Bluetooth (BT) and WiMedia Ultra Wide Band (UWB), into a single BT over UWB (BToUWB) spe...
Alexandre Lewicki, Javier del Prado Pavon, Jacky T...
ACSAC
2007
IEEE
15 years 11 months ago
Closed-Circuit Unobservable Voice over IP
Among all the security issues in Voice over IP (VoIP) communications, one of the most difficult to achieve is traffic analysis resistance. Indeed, classical approaches provide a...
Carlos Aguilar Melchor, Yves Deswarte, Julien Iguc...