Sciweavers

4744 search results - page 400 / 949
» Connected Computing
Sort
View
FOSSACS
2005
Springer
15 years 10 months ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
141
Voted
GI
2005
Springer
15 years 10 months ago
Security Extensions to MMARP Through Cryptographically Generated Addresses
: The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially des...
Francisco J. Galera, Pedro M. Ruiz, Antonio F. G&o...
ICCS
2005
Springer
15 years 10 months ago
Multiresolution Reconstruction of Pipe-Shaped Objects from Contours
We reconstruct pipe-shaped objects from a set of contours, each of which is extracted from an image representing a slice sampled from 3D volume data. The contours are formed by con...
Kyung Ha Min, In-Kwon Lee
142
Voted
PACT
2005
Springer
15 years 10 months ago
Information Flow Analysis for VHDL
We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow a...
Terkel K. Tolstrup, Flemming Nielson, Hanne Riis N...
120
Voted
PAM
2005
Springer
15 years 10 months ago
Measurement Based Analysis of the Handover in a WLAN MIPv6 Scenario
Abstract. This paper studies the problems related to mobile connectivity on a wireless environment with Mobile IPv6, specially the handover, which is the most critical part. The ma...
Albert Cabellos-Aparicio, René Serral-Graci...