Sciweavers

2108 search results - page 169 / 422
» Encrypted
Sort
View
101
Voted
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 3 months ago
Cryptanalysis of the RSA-CEGD protocol
Recently, Nenadi
Juan M. Estévez-Tapiador, Almudena Alcaide,...
147
Voted
IEEEHPCS
2010
14 years 10 months ago
XPSoC: A reconfigurable solution for multimedia contents protection
Network Multimedia data also need to be encrypted to protect private content and access control. Considering performance constraints and embedded system issues, many hardware solu...
Linfeng Ye, Jean-Philippe Diguet, Guy Gogniat
138
Voted
ICUIMC
2011
ACM
14 years 7 months ago
MundoMessage: enabling trustworthy ubiquitous emergency communication
Efficient emergency communication is of high practical importance, but has specific challenges: unpredictable local emergency situations harden the establishment of communication...
Stefan G. Weber, Yulian Kalev, Sebastian Ries, Max...
145
Voted
APPROX
2011
Springer
272views Algorithms» more  APPROX 2011»
14 years 3 months ago
Public Key Locally Decodable Codes with Short Keys
This work considers locally decodable codes in the computationally bounded channel model. The computationally bounded channel model, introduced by Lipton in 1994, views the channe...
Brett Hemenway, Rafail Ostrovsky, Martin J. Straus...
CSE
2011
IEEE
14 years 3 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...