Sciweavers

1010 search results - page 31 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
SAC
2004
ACM
15 years 5 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
ESANN
2008
15 years 1 months ago
Neural networks for computational neuroscience
Computational neuroscience is an appealing interdisciplinary domain, at the interface between biology and computer science. It aims at understanding the experimental data obtained...
David Meunier, Hélène Paugam-Moisy
AINA
2004
IEEE
15 years 3 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 3 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
MOBISYS
2007
ACM
15 years 11 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang