Essays about: "No random access algorithm"
Found 3 essays containing the words No random access algorithm.
-
1. Electromagnetic analysis of AES-256 on Xilinx Artix-7
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this project, an electromagnetic side-channel attack has been made by exploiting the information leakage from a field programmable gate array (FPGA) and an implemented advanced encryption standard with a 256-bit key (AES-256). The FPGA-board was a Nexys-4 from Digilent with Artix-7 FPGA. The attack was partially successful. READ MORE
-
2. TOP-K AND SKYLINE QUERY PROCESSING OVER RELATIONAL DATABASE
University essay from JTH. Forskningsmiljö InformationsteknikAbstract : Top-k and Skyline queries are a long study topic in database and information retrieval communities and they are two popular operations for preference retrieval. Top-k query returns a subset of the most relevant answers instead of all answers. Efficient top-k processing retrieves the k objects that have the highest overall score. READ MORE
-
3. Authentication of Queries in Wireless Sensor Networks
University essay from Institutionen för informationsteknologiAbstract : AQF protocol is a novel approach to authenticate queries in wireless sensor networks to avoid that anybody can inject fake queries in to WSN and likewise to avoid modification of legitimate queries by adversary. Because in any sensor network, sensor nodes are distributed in a width geographical area, an adversary can get a physical access to some sensor nodes and use them to inject some fake queries or to change some of forwarded quires into the network. READ MORE