Sciweavers

389 search results - page 43 / 78
» Computational Alternatives to Random Number Generators
Sort
View
ACSC
2005
IEEE
14 years 1 months ago
Simulating Network Robustness for Critical Infrastructure Networks
We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of d...
Anthony H. Dekker
AINA
2004
IEEE
13 years 11 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
DAC
1995
ACM
13 years 11 months ago
Power Estimation in Sequential Circuits
Abstract A new method for power estimation in sequential circuits is presented that is based on a statistical estimation technique. By applying randomly generated input sequences t...
Farid N. Najm, Shashank Goel, Ibrahim N. Hajj
CCS
2010
ACM
13 years 7 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
UML
2005
Springer
14 years 1 months ago
Replicators: Transformations to Address Model Scalability
In Model Integrated Computing, it is often desirable to evaluate different design alternatives as they relate to issues of scalability. A typical approach to address scalability is...
Jeffrey G. Gray, Yuehua Lin, Jing Zhang, Steven No...