Sciweavers

173 search results - page 13 / 35
» Efficient One-Round Key Exchange in the Standard Model
Sort
View
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 1 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
75
Voted
ICAS
2009
IEEE
169views Robotics» more  ICAS 2009»
15 years 4 months ago
Ontonuts: Reusable Semantic Components for Multi-agent Systems
The volumes of data in information systems are growing drastically. The systems become increasingly complex in trying to handle heterogeneity of ubiquitous components, standards, ...
Sergiy Nikitin, Artem Katasonov, Vagan Y. Terziyan
EUROPAR
2007
Springer
15 years 1 months ago
Efficient Parallel Simulation of Large-Scale Neuronal Networks on Clusters of Multiprocessor Computers
To understand the principles of information processing in the brain, we depend on models with more than 105 neurons and 109 connections. These networks can be described as graphs o...
Hans E. Plesser, Jochen M. Eppler, Abigail Morriso...
ISN
2000
Springer
127views Communications» more  ISN 2000»
15 years 1 months ago
Supporting Advanced Multimedia Telecommunications Services Using the Distributed Component Object Model
The demand for a great variety of sophisticated telecommunications services with multimedia characteristics is increasing. This trend highlights the need for the efficient creation...
Dionisis X. Adamopoulos, George Pavlou, Constantin...
CCS
2006
ACM
15 years 1 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao