Sciweavers

3629 search results - page 656 / 726
» A More Efficient Use of Delta-CRLs
Sort
View
IJNSEC
2008
135views more  IJNSEC 2008»
14 years 9 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
IJSN
2008
80views more  IJSN 2008»
14 years 9 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
IJRR
2006
183views more  IJRR 2006»
14 years 9 months ago
Bayesian Occupancy Filtering for Multitarget Tracking: An Automotive Application
Reliable and efficient perception and reasoning in dynamic and densely cluttered environments are still major challenges for driver assistance systems. Most of today's system...
Christophe Coué, Cédric Pradalier, C...
JUCS
2008
140views more  JUCS 2008»
14 years 9 months ago
Parallel Formulations of Scalar Multiplication on Koblitz Curves
We present an algorithm that by using the and -1 Frobenius operators concurrently allows us to obtain a parallelized version of the classical -and-add scalar multiplication algor...
Omran Ahmadi, Darrel Hankerson, Francisco Rodr&iac...
JSAC
2006
81views more  JSAC 2006»
14 years 9 months ago
Fast linearized energy allocation for multimedia loading on multicarrier systems
Abstract--Efficient near-optimal energy allocation for multimedia data transmission using multicarrier modulation is investigated. The optimal method typically relies on an iterati...
Michael A. Enright, C. C. Jay Kuo