Sciweavers

577 search results - page 62 / 116
» Engineering Sufficiently Secure Computing
Sort
View
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
15 years 3 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
15 years 3 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
IJACT
2008
136views more  IJACT 2008»
15 years 3 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
TIP
2008
165views more  TIP 2008»
15 years 2 months ago
Activity Modeling Using Event Probability Sequences
Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in...
Naresh P. Cuntoor, B. Yegnanarayana, Rama Chellapp...
GRAPHICSINTERFACE
1996
15 years 4 months ago
A Technique for Constructing Developable Surfaces
Paper, sheet metal, and many other materials are approximately unstretchable. The surfaces obtained by bending these materials can be flattened onto a plane without stretching or ...
Meng Sun, Eugene Fiume