Sciweavers

620 search results - page 31 / 124
» The computational power of population protocols
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
IPPS
2006
IEEE
15 years 3 months ago
A stochastic multi-objective algorithm for the design of high performance reconfigurable architectures
The increasing demand for FPGAs and reconfigurable hardware targeting high performance low power applications has lead to an increasing requirement for new high performance reconf...
Wing On Fung, Tughrul Arslan
CARDIS
2010
Springer
168views Hardware» more  CARDIS 2010»
15 years 4 months ago
Secure Delegation of Elliptic-Curve Pairing
In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing. A computationally limited device (typically a smart-card) will delegate the computa...
Benoît Chevallier-Mames, Jean-Sébasti...
PODC
2010
ACM
14 years 7 months ago
Brief announcement: distributed contention resolution in wireless networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking
PERCOM
2007
ACM
15 years 9 months ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta