Sciweavers

1777 search results - page 139 / 356
» Programming Cryptographic Protocols
Sort
View
JCS
2011
156views more  JCS 2011»
14 years 8 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
EUROCRYPT
2011
Springer
14 years 4 months ago
Semi-homomorphic Encryption and Multiparty Computation
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted input by manipulating only the ciphertexts. We define the relaxed notion of a se...
Rikke Bendlin, Ivan Damgård, Claudio Orlandi...
ITC
2003
IEEE
102views Hardware» more  ITC 2003»
15 years 6 months ago
Evolution of IEEE 1149.1 Addressable Shadow Protocol Devices
This paper describes an Addressable Shadow Protocol device that is capable of providing connectivity between a backplane resident IEEE 1149.1 test bus master and a plurality of 11...
Rakesh N. Joshi, Kenneth L. Williams, Lee Whetsel
DEBS
2007
ACM
15 years 5 months ago
Architect's dream or developer's nightmare?
Architectural principles such as loose coupling are the key drivers behind the adoption of service-oriented architectures. Service-oriented architectures promote concepts such as c...
Gregor Hohpe
PPL
2002
108views more  PPL 2002»
15 years 28 days ago
An Efficient Implementation of the BSP Programming Library for VIA
Virtual Interface Architecture(VIA) is a light-weight protocol for protected user-level zero-copy communication. In spite of the promised high performance of VIA, previous MPI imp...
Yang-Suk Kee, Soonhoi Ha