Sciweavers

18 search results - page 1 / 4
» The Performance of OPC-UA Security Model at Field Device Lev...
Sort
View
ICINCO
2009
124views Robotics» more  ICINCO 2009»
13 years 3 months ago
The Performance of OPC-UA Security Model at Field Device Level
Olli Post, Jari Seppälä, Hannu Koivisto
DATE
2008
IEEE
118views Hardware» more  DATE 2008»
13 years 7 months ago
Layout Level Timing Optimization by Leveraging Active Area Dependent Mobility of Strained-Silicon Devices
Advanced MOSFETs such as Strained Silicon (SS) devices have emerged as critical enablers to keep Moore's law on track for sub100nm technologies. Use of Strained Silicon devic...
Ashutosh Chakraborty, Sean X. Shi, David Z. Pan
IJNSEC
2010
247views more  IJNSEC 2010»
13 years 11 days ago
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and imp...
Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail
IEEEIAS
2009
IEEE
14 years 5 days ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
IJNSEC
2008
135views more  IJNSEC 2008»
13 years 5 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun