Sciweavers

420 search results - page 66 / 84
» Efficient Implementation of the Orlandi Protocol
Sort
View
105
Voted
MASCOTS
2001
15 years 1 months ago
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem
As the Internet commerce becomes a more important part of the economy, network security is receiving more emphasis. Time spent in data encryption can be a significant performance ...
Zhi Li, John Higgins, Mark J. Clement
ENTCS
2008
110views more  ENTCS 2008»
15 years 17 days ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...
ISJGP
2007
146views more  ISJGP 2007»
15 years 12 days ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
106
Voted
CN
2002
161views more  CN 2002»
15 years 9 days ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert
110
Voted
COMCOM
1998
132views more  COMCOM 1998»
15 years 5 days ago
A distributed object platform infrastructure for multimedia applications
Although distributed object computing has developed rapidly over the past decade, and is now becoming commercially important, there remain key application areas inadequately suppo...
Geoff Coulson, Michael Clarke