Sciweavers

45 search results - page 3 / 9
» A complete characterization of a family of key exchange prot...
Sort
View
FPL
1998
Springer
107views Hardware» more  FPL 1998»
13 years 11 months ago
Modular Exponent Realization on FPGAs
The article describes modular exponent calculations used widely in cryptographic key exchange protocols. The measures for hardware consumption and execution speed based on argument...
Juri Põldre, Kalle Tammemäe, Marek Man...
TCS
1998
13 years 6 months ago
Threshold Dominating Sets and an Improved Characterization of W[2]
The Threshold Dominating Set problem is that of determining for a graph G = (V, E) whether there is a subset V ⊆ V of size k, such that for each vertex v ∈ V there are at leas...
Rodney G. Downey, Michael R. Fellows
ICDT
2007
ACM
185views Database» more  ICDT 2007»
14 years 1 months ago
Characterization of the Interaction of XML Functional Dependencies with DTDs
With the rise of XML as a standard model of data exchange, XML functional dependencies (XFDs) have become important to areas such as key analysis, document normalization, and data ...
Lucja Kot, Walker M. White
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
13 years 5 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
TIFS
2010
184views more  TIFS 2010»
13 years 5 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...