Sciweavers

4529 search results - page 15 / 906
» Position Based Cryptography
Sort
View
CDC
2008
IEEE
139views Control Systems» more  CDC 2008»
15 years 1 months ago
Pull-in control during nanometric positioning by near field position sensing
This paper deals with the pull-in control and the nanopositioning of an electrostatically actuated NEMS (Nano Electromechanical System) squeezed between two forces. It is shown tha...
Sylvain Blanvillain, Alina Voda, Gildas Besan&cced...
FCS
2006
15 years 1 months ago
Polynomially Uncomputable Number-Theoretic Problems in Cryptography and Network Security
By far the most important automated tool for network and communications security is encryption, but encryption itself needs security. As we know, many cryptosystems and cryptograp...
Song Y. Yan, Glyn James, Gongyi Wu
PERCOM
2005
ACM
15 years 11 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
IDTRUST
2009
ACM
15 years 6 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 12 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...