Sciweavers

1010 search results - page 42 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
ICNS
2009
IEEE
15 years 6 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
MOBIHOC
2005
ACM
15 years 11 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
BC
2002
108views more  BC 2002»
14 years 11 months ago
Spike-timing-dependent plasticity: common themes and divergent vistas
Abstract. Recent experimental observations of spiketiming-dependent synaptic plasticity (STDP) have revitalized the study of synaptic learning rules. The most surprising aspect of ...
Ádám Kepecs, Mark C. W. van Rossum, ...
ECUMN
2007
Springer
15 years 1 months ago
Towards Sensor Integration into Multimedia Applications
Since few years, several applications are proposed on mobile devices. However, these applications are not aware of their physical environment. The emergence of wireless sensors, a...
Christine Louberry, Philippe Roose, Marc Dalmau
INFOCOM
2010
IEEE
14 years 10 months ago
Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANs
—In IEEE 802.22 Wireless Regional Area Networks (WRANs), each Base Station (BS) solves a complex resource allocation problem of simultaneously determining the channel to reuse, p...
Hyoil Kim, Kang G. Shin