Sciweavers

10 search results - page 1 / 2
» ima 2003
Sort
View
IMA
2003
Springer
114views Cryptology» more  IMA 2003»
13 years 10 months ago
A Designer's Guide to KEMs
Alexander W. Dent
IMA
2003
Springer
69views Cryptology» more  IMA 2003»
13 years 10 months ago
Separating and Intersecting Properties of BCH and Kasami Codes
Hans Georg Schaathun, Tor Helleseth
IMA
2003
Springer
97views Cryptology» more  IMA 2003»
13 years 10 months ago
Remote User Authentication Using Public Information
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only sym...
Chris J. Mitchell
ISICT
2003
13 years 6 months ago
A new approach for distributed computing in avionics systems
Historically, a typical avionics system architecture has been designed as a federated architecture of black-boxes with well-defined functions and implemented on fully dedicated co...
Miguel A. Sánchez-Puebla, Jesús Carr...