Sciweavers

1255 search results - page 162 / 251
» On Simple and Secure Key Distribution
Sort
View
111
Voted
ENTCS
2006
121views more  ENTCS 2006»
15 years 4 months ago
A Logic for Graphs with QoS
We introduce a simple graph logic that supports specification of Quality of Service (QoS) properties of applications. The idea is that we are not only interested in representing w...
GianLuigi Ferrari, Alberto Lluch-Lafuente
JCNS
2006
69views more  JCNS 2006»
15 years 4 months ago
Effects of stimulus transformations on estimates of sensory neuron selectivity
Stimulus selectivity of sensory systems is often characterized by analyzing responseconditioned stimulus ensembles. However, in many cases these response-triggered stimulus sets h...
Alexander G. Dimitrov, Tomás Gedeon
EUROPKI
2007
Springer
15 years 10 months ago
On Partial Anonymity in Secret Sharing
Abstract. Anonymous secret sharing schemes allow a secret to be recovered from shares regardless of the identity of shareholders. Besides being interesting in its own right, this p...
Vanesa Daza, Josep Domingo-Ferrer
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 8 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
IPPS
2003
IEEE
15 years 9 months ago
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array
This paper describes a hardware architecture for modular multiplication operation which is efficient for bit-lengths suitable for both commonly used types of Public Key Cryptogra...
Siddika Berna Örs, Lejla Batina, Bart Preneel...