Sciweavers

51 search results - page 6 / 11
» aes 2006
Sort
View
75
Voted
IJNSEC
2007
137views more  IJNSEC 2007»
14 years 10 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
79
Voted
AES
2006
Springer
106views Cryptology» more  AES 2006»
14 years 10 months ago
A grid-enabled problem solving environment for parallel computational engineering design
This paper describes the development and application of a piece of engineering software that provides a Problem Solving Environment (PSE) capable of launching, and interfacing wit...
C. E. Goodyer, Martin Berzins, Peter K. Jimack, L....
69
Voted
AES
2007
Springer
92views Cryptology» more  AES 2007»
14 years 10 months ago
MicroARTMAP for pattern recognition problems
Pattern recognition is an important aspect of a dominant technology such as machine intelligence. Domain specific fuzzy-neuro models particularly for the ‘black box’ implemen...
Sundaramoorthy Rajasekaran, Vasantha Kalyani David
DAS
2006
Springer
15 years 1 months ago
Automated Scoring of Handwritten Essays Based on Latent Semantic Analysis
Handwritten essays are widely used in educational assessments, particularly in classroom instruction. This paper concerns the design of an automated system for performing the task ...
Sargur N. Srihari, Jim Collins, Rohini K. Srihari,...
EUROCRYPT
2006
Springer
15 years 1 months ago
A Provable-Security Treatment of the Key-Wrap Problem
Abstract. We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that key-wrap's goal is security in the ...
Phillip Rogaway, Thomas Shrimpton