Sciweavers

1050 search results - page 31 / 210
» Two methods of authenticated positioning
Sort
View
94
Voted
SEC
2001
15 years 1 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater
IJNSEC
2007
156views more  IJNSEC 2007»
14 years 11 months ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
BMCBI
2011
14 years 3 months ago
AMDORAP: Non-targeted metabolic profiling based on high-resolution LC-MS
Background: Liquid chromatography-mass spectrometry (LC-MS) utilizing the high-resolution power of an orbitrap is an important analytical technique for both metabolomics and prote...
Hiroki Takahashi, Takuya Morimoto, Naotake Ogasawa...
COMPUTING
2010
14 years 9 months ago
Modified HSS iteration methods for a class of complex symmetric linear systems
In this paper, we introduce and analyze a modification of the Hermitian and skewHermitian splitting iteration method for solving a broad class of complex symmetric linear systems....
Zhong-Zhi Bai, Michele Benzi, Fang Chen
ICSEA
2009
IEEE
14 years 9 months ago
Integrating Formal Methods with Model-Driven Engineering
In this paper, we present our position and experience on integrating formal methods with the Model-driven Engineering (MDE) approach to software development. Both these two approa...
Angelo Gargantini, Elvinia Riccobene, Patrizia Sca...