Sciweavers

105 search results - page 19 / 21
» Efficient elliptic curve exponentiation
Sort
View
AUTONOMICS
2007
ACM
13 years 10 months ago
Characterizing pairwise inter-contact patterns in delay tolerant networks
A good understanding of contact patterns in delay tolerant networks (DTNs) is essential for the design of effective routing schemes. Prior work has typically focused on intercontac...
Vania Conan, Jeremie Leguay, Timur Friedman
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 4 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
TASLP
2010
150views more  TASLP 2010»
13 years 29 days ago
Diffuse Reverberation Model for Efficient Image-Source Simulation of Room Impulse Responses
Abstract-- In many research fields of engineering and acoustics, the image-source model represents one of the most popular tools for the simulation of sound fields in virtual rever...
Eric A. Lehmann, Anders M. Johansson
SECURWARE
2008
IEEE
14 years 19 days ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
13 years 11 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys