Sciweavers

6300 search results - page 1106 / 1260
» We have it easy, but do we have it right
Sort
View
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
15 years 5 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 5 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
CGO
2004
IEEE
15 years 5 months ago
Custom Data Layout for Memory Parallelism
In this paper, we describe a generalized approach to deriving a custom data layout in multiple memory banks for array-based computations, to facilitate high-bandwidth parallel mem...
Byoungro So, Mary W. Hall, Heidi E. Ziegler
HPCN
2000
Springer
15 years 5 months ago
A Java-Based Parallel Programming Support Environment
The Java programming language and environment is stimulating new research activities in many areas of computing, not the least of which is parallel computing. Parallel techniques ...
Kenneth A. Hawick, Heath A. James
ICCBR
1995
Springer
15 years 4 months ago
Route Planning by Analogy
There have been several e orts to create and use real maps in computer applications that automatically nd good map routes. In general, online map representations do not include in...
Karen Zita Haigh, Manuela M. Veloso
« Prev « First page 1106 / 1260 Last » Next »