Sciweavers

488 search results - page 59 / 98
» Policy-Based Cryptography and Applications
Sort
View
IAJIT
2006
145views more  IAJIT 2006»
15 years 20 days ago
Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers
In this paper, a fast hardware architecture for elliptic curve cryptography computation in Galois Field GF(p) is proposed. The architecture is implemented for 160-bits, as its dat...
Adnan Abdul-Aziz Gutub
88
Voted
SETA
2010
Springer
164views Mathematics» more  SETA 2010»
14 years 11 months ago
Synchronization of Boolean Dynamical Systems: A Spectral Characterization
Abstract. In this paper a spectral characterization of the synchronization property of Boolean dynamical systems is provided. Conditions on the spectrum of the next-state function ...
Jérémy Parriaux, Philippe Guillot, G...
119
Voted
MASS
2010
110views Communications» more  MASS 2010»
14 years 10 months ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
114
Voted
PERCOM
2010
ACM
14 years 10 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
92
Voted
CORR
2011
Springer
180views Education» more  CORR 2011»
14 years 7 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak