Sciweavers

10 search results - page 1 / 2
» ima 2003
Sort
View
IMA
2003
Springer
114views Cryptology» more  IMA 2003»
15 years 2 months ago
A Designer's Guide to KEMs
Alexander W. Dent
IMA
2003
Springer
69views Cryptology» more  IMA 2003»
15 years 2 months ago
Separating and Intersecting Properties of BCH and Kasami Codes
Hans Georg Schaathun, Tor Helleseth
78
Voted
IMA
2003
Springer
97views Cryptology» more  IMA 2003»
15 years 2 months ago
Remote User Authentication Using Public Information
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only sym...
Chris J. Mitchell
ISICT
2003
14 years 10 months ago
A new approach for distributed computing in avionics systems
Historically, a typical avionics system architecture has been designed as a federated architecture of black-boxes with well-defined functions and implemented on fully dedicated co...
Miguel A. Sánchez-Puebla, Jesús Carr...