Sciweavers

472 search results - page 7 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
CORR
2010
Springer
427views Education» more  CORR 2010»
13 years 8 months ago
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algori
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent charact...
Poonam Garg
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 5 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
BIOSIG
2009
169views Biometrics» more  BIOSIG 2009»
13 years 7 months ago
Reverse Public Key Encryption
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
David Naccache, Rainer Steinwandt, Moti Yung
ICWN
2007
13 years 11 months ago
A New Lightweight and Scalable Encryption Algorithm for Streaming Video over Wireless Networks
Wireless networks are poised to enable a variety of existing and emerging video streaming applications. However, video streaming over wireless suffers from piracy and malicious at...
Hao Wang, Chong-wei Xu