Sciweavers

14704 search results - page 2703 / 2941
» computing 2007
Sort
View
IJNSEC
2007
137views more  IJNSEC 2007»
15 years 4 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
138
Voted
IJNSEC
2007
126views more  IJNSEC 2007»
15 years 4 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
IJNSEC
2007
147views more  IJNSEC 2007»
15 years 4 months ago
A Genetic Algorithm for Cryptanalysis of DES-8
Various cryptosystems exploit exhaustive techniques to search, missing-the-mark, key space. Such search techniques should be guided in order to be computationally adequate. Here, ...
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, F...
IJOE
2007
107views more  IJOE 2007»
15 years 4 months ago
Learning Digital Test and Diagnostics via Internet
: An environment targeted to e-learning is presented for teaching design and test of electronic systems. The environment consists of a set of Java applets, and of web based access ...
Raimund Ubar, Artur Jutman, Margus Kruus, Elmet Or...
IJON
2007
93views more  IJON 2007»
15 years 4 months ago
How much can we trust neural simulation strategies?
Despite a steady improvement of computational hardware, results of numerical simulation are still tightly bound to the simulation tool and strategy used, and may substantially var...
Michelle Rudolph, Alain Destexhe
« Prev « First page 2703 / 2941 Last » Next »