Sciweavers

6574 search results - page 25 / 1315
» Current Signatures: Application
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 9 months ago
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem by employing Extended Euclidean algorithm. They claimed that the proposed scheme was untraceable...
Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang
COMPSAC
2008
IEEE
14 years 4 months ago
Safety in Automotive Software: An Overview of Current Practices
Electronic control units and on-board networks for automotive applications cover a big variety of functions that in many cases are responsible of safetycritical behavior of the ve...
Paolo Panaroni, Giovanni Sartori, Fabrizio Fabbrin...
ISMVL
1993
IEEE
90views Hardware» more  ISMVL 1993»
14 years 1 months ago
Current-Mode CMOS Galois Field Circuits
Use of current-mode CMOS circuitsfor implementation of multiple-valued logic (MVL)functions has been considered in a number of recent papers. In this paper, we present an applicat...
Zeljko Zilic, Zvonko G. Vranesic
DT
2010
99views more  DT 2010»
13 years 9 months ago
CEDA Currents
specified at levels of abstraction higher than the Register Transfer Level (RTL) in hardware description. The essential feature of a behavioral description is that, the designer on...
DEBU
2007
211views more  DEBU 2007»
13 years 9 months ago
Provenance in Databases: Past, Current, and Future
The need to understand and manage provenance arises in almost every scientific application. In many cases, information about provenance constitutes the proof of correctness of re...
Wang Chiew Tan