Sciweavers

16218 search results - page 3111 / 3244
» Standards
Sort
View
IJNSEC
2008
164views more  IJNSEC 2008»
15 years 5 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 5 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 5 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
CE
2007
122views more  CE 2007»
15 years 5 months ago
Employing virtual humans for education and training in X3D/VRML worlds
Web-based education and training provides a new paradigm for imparting knowledge; students can access the learning material anytime by operating remotely from any location. Web3D ...
Lucio Ieronutti, Luca Chittaro
IJRR
2008
109views more  IJRR 2008»
15 years 5 months ago
Robotic Grasping of Novel Objects using Vision
We consider the problem of grasping novel objects, specifically ones that are being seen for the first time through vision. Grasping a previously unknown object, one for which a 3...
Ashutosh Saxena, Justin Driemeyer, Andrew Y. Ng
« Prev « First page 3111 / 3244 Last » Next »