Sciweavers

123 search results - page 12 / 25
» High Performance GHASH Function for Long Messages
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 3 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
ICRA
2008
IEEE
129views Robotics» more  ICRA 2008»
15 years 4 months ago
Communication-aware motion planning in fading environments
— In this paper we create a framework to model and characterize the impact of time-varying fading communication links on the performance of a mobile sensor network. We propose co...
Yasamin Mostofi
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 1 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
EUROPAR
2010
Springer
14 years 10 months ago
Profile-Driven Selective Program Loading
Abstract. Complex software systems use many shared libraries frequently composed of large off-the-shelf components. Only a limited number of functions are used from these shared li...
Tugrul Ince, Jeffrey K. Hollingsworth
ITIIS
2010
186views more  ITIIS 2010»
14 years 4 months ago
Adaptive Binary Negative-Exponential Backoff Algorithm Based on Contention Window Optimization in IEEE 802.11 WLAN
IEEE 802.11 medium access control (MAC) employs the distributed coordination function (DCF) as the fundamental medium access function. DCF operates with binary exponential backoff...
Bum-Gon Choi, Ju Yong Lee, Min Young Chung