Sciweavers

117 search results - page 3 / 24
» A Comparison of Cryptography Courses
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Color extended visual cryptography using error diffusion
This paper introduces a color visual cryptography encryption method that produces meaningful color shares via visual information pixel (VIP) synchronization and error diffusion ha...
In Koo Kang, Gonzalo R. Arce, Heung-Kyu Lee
PERCOM
2005
ACM
14 years 7 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
PERCOM
2005
ACM
14 years 7 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
SRDS
2006
IEEE
14 years 1 months ago
Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols
The paper presents a comparative performance study of the two main classes of randomized binary consensus protocols: a local coin protocol, with an expected high communication com...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
SEKE
2005
Springer
14 years 26 days ago
State of the Survey on Team-based Software Engineering Project Course
It is recognized importance of team-based software engineering education in these days, and lots of case studies have been reported. This paper describes a comparative study on te...
Atsuo Hazeyama