University of Versailles Saint-Quentin-en-Yvelines

Displaying 1-5 of 5 results

  • White Papers // Jun 2012

    New Approach Construction for Wireless ZigBee Sensor Based on Embedding Pancake Graphs

    Wireless Sensor Networks (WSN) based on the IEEE 802.15.4 standard are constantly expanding. Applications like production control, building control are more and more based on WSN because of their energy efficiency, self organizing capacity and protocol flexibility. However, the construction of Cluster-Tree networks based on the beacon mode Pancake graphs...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Dec 2011

    Analysis of Some Natural Variants of the PKP Algorithm

    In this paper, the authors studied simple variants of PKP. Using one idea alone doesn't give good results but, surprisingly, combining 3 ideas creates a more efficient scheme. Those 3 ideas are : to change the characteristic to 2, to use multiple vectors and to use a 3 rounds scheme...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Apr 2011

    File Transfer Application for Sharing Femto Access

    In wireless access network optimization, today's main challenges reside in traffic offload and in the improvement of both capacity and coverage networks. The operators are interested in solving their localized coverage and capacity problems in areas where the macro network signal is not able to serve the demand for mobile...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Feb 2011

    Fault Attacks on RSA Public Keys: Left-to-Right Implementations Are Also Vulnerable

    After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. The authors provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Jan 2010

    Janus: Automatic Ontology Builder From XSD Files

    The construction of reference ontology for a large domain still remains a hard human task. The process is sometimes assisted by software tools that facilitate the information extraction from a textual corpus. Despite of the great use of XML Schema files on the internet and especially in the B2B domain,...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Jan 2010

    Janus: Automatic Ontology Builder From XSD Files

    The construction of reference ontology for a large domain still remains a hard human task. The process is sometimes assisted by software tools that facilitate the information extraction from a textual corpus. Despite of the great use of XML Schema files on the internet and especially in the B2B domain,...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Feb 2011

    Fault Attacks on RSA Public Keys: Left-to-Right Implementations Are Also Vulnerable

    After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. The authors provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Dec 2011

    Analysis of Some Natural Variants of the PKP Algorithm

    In this paper, the authors studied simple variants of PKP. Using one idea alone doesn't give good results but, surprisingly, combining 3 ideas creates a more efficient scheme. Those 3 ideas are : to change the characteristic to 2, to use multiple vectors and to use a 3 rounds scheme...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Apr 2011

    File Transfer Application for Sharing Femto Access

    In wireless access network optimization, today's main challenges reside in traffic offload and in the improvement of both capacity and coverage networks. The operators are interested in solving their localized coverage and capacity problems in areas where the macro network signal is not able to serve the demand for mobile...

    Provided By University of Versailles Saint-Quentin-en-Yvelines

  • White Papers // Jun 2012

    New Approach Construction for Wireless ZigBee Sensor Based on Embedding Pancake Graphs

    Wireless Sensor Networks (WSN) based on the IEEE 802.15.4 standard are constantly expanding. Applications like production control, building control are more and more based on WSN because of their energy efficiency, self organizing capacity and protocol flexibility. However, the construction of Cluster-Tree networks based on the beacon mode Pancake graphs...

    Provided By University of Versailles Saint-Quentin-en-Yvelines