Sciweavers

404 search results - page 19 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
83
Voted
ACISP
2007
Springer
15 years 1 months ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...
TVLSI
2011
216views more  TVLSI 2011»
14 years 4 months ago
Energy and Performance Models for Synchronous and Asynchronous Communication
—Communication costs, which have the potential to throttle design performance as scaling continues, are mathematically modeled and compared for various pipeline methodologies. Fi...
Kenneth S. Stevens, Pankaj Golani, Peter A. Beerel
77
Voted
ASYNC
2003
IEEE
97views Hardware» more  ASYNC 2003»
15 years 2 months ago
Energy and Performance Models for Clocked and Asynchronous Communication
Parameterized first-order models for throughput, energy, and bandwidth are presented in this paper. Models are developed for many common pipeline methodologies, including clocked...
Kenneth S. Stevens
69
Voted
EDCC
2005
Springer
15 years 3 months ago
Performance Evaluation of Consistent Recovery Protocols Using MPICH-GF
This paper presents an implementation of several consistent protocols at the abstract device level and their performance comparison. We have performed experiments using three NAS P...
Namyoon Woo, Hyungsoo Jung, Dongin Shin, Hyuck Han...
88
Voted
HPDC
1997
IEEE
15 years 1 months ago
Packing Messages as a Tool for Boosting the Performance of Total Ordering Protocols
This paper compares the throughput and latency of four protocols that provide total ordering. Two of these protocols are measured with and without message packing. We used a techn...
Roy Friedman, Robbert van Renesse