Sciweavers

453 search results - page 3 / 91
» On the complexity of exchanging
Sort
View
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
13 years 11 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
JCP
2006
120views more  JCP 2006»
13 years 5 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
PC
1998
196views Management» more  PC 1998»
13 years 5 months ago
DataExchange: High Performance Communications in Distributed Laboratories
Current communications tools and libraries for high performance computing are designed for platforms and applications that exhibit relatively stable computational and communicatio...
Greg Eisenhauer, Beth Plale, Karsten Schwan
ICCS
2009
Springer
13 years 3 months ago
Graphical Notation for Diagramming Coupled Systems
Multiphysics and multiscale
J. Walter Larson
STOC
2001
ACM
129views Algorithms» more  STOC 2001»
14 years 6 months ago
Interaction in quantum communication and the complexity of set disjointness
One of the most intriguing facts about communication using quantum states is that these states cannot be used to transmit more classical bits than the number of qubits used, yet i...
Hartmut Klauck, Ashwin Nayak, Amnon Ta-Shma, David...