Sciweavers

346 search results - page 70 / 70
» Boundary Estimation in Sensor Networks: Theory and Methods
Sort
View
EUC
2005
Springer
14 years 27 days ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...