Sciweavers

1010 search results - page 9 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
AINA
2007
IEEE
15 years 3 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park
AINA
2009
IEEE
15 years 6 months ago
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Antonio Silva, Julien Huillery, Sergio M. Jesus
ICPR
2008
IEEE
15 years 6 months ago
Adaptive asymmetrical SVM and genetic algorithms based iris recognition
We propose Genetic Algorithms to improve the feature subset selection by combining the valuable outcomes from multiple feature selection methods. This paper also motivates the use...
Kaushik Roy 0002, Prabir Bhattacharya
EUROPAR
2006
Springer
15 years 3 months ago
Master-Slave Tasking on Asymmetric Networks
Abstract. This paper presents new techniques for master-slave tasking on treeshaped networks with fully heterogeneous communication and processing resources. A large number of inde...
Cyril Banino-Rokkones, Olivier Beaumont, Lasse Nat...
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 5 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...