Sciweavers

4323 search results - page 634 / 865
» Callback Implementations in C
Sort
View
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 4 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 4 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
JAIR
2008
103views more  JAIR 2008»
15 years 4 months ago
ICE: An Expressive Iterative Combinatorial Exchange
We present the design and analysis of the first fully expressive, iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language (TBBL) that is co...
Benjamin Lubin, Adam I. Juda, Ruggiero Cavallo, S&...
CORR
2007
Springer
120views Education» more  CORR 2007»
15 years 4 months ago
Distributed Fair Scheduling Using Variable Transmission Lengths in Carrier-Sensing-based Wireless Networks
— The fairness of IEEE 802.11 wireless networks (including Wireless LAN and Ad-hoc networks) is hard to predict and control because of the randomness and complexity of the MAC co...
Libin Jiang, Jean C. Walrand
JIRS
2008
110views more  JIRS 2008»
15 years 4 months ago
A Multi-Modal Haptic Interface for Virtual Reality and Robotics
In this paper we present an innovative haptic device that combines the electro-tactile stimulation with the force and visual feedbacks in order to improve the perception of a virtu...
Michele Folgheraiter, Giuseppina C. Gini, Dario L....