Sciweavers

438 search results - page 35 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
CORR
2010
Springer
211views Education» more  CORR 2010»
13 years 7 months ago
Studying the Feasibility and Importance of Software Testing: An Analysis
Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of tes...
S. S. Riaz Ahamed
ICN
2009
Springer
14 years 4 days ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
GLVLSI
2008
IEEE
147views VLSI» more  GLVLSI 2008»
14 years 2 months ago
Statistical timing analysis of flip-flops considering codependent setup and hold times
Statistical static timing analysis (SSTA) plays a key role in determining performance of the VLSI circuits implemented in state-of-the-art CMOS technology. A pre-requisite for emp...
Safar Hatami, Hamed Abrishami, Massoud Pedram
CODES
2006
IEEE
14 years 1 months ago
The pipeline decomposition tree: : an analysis tool for multiprocessor implementation of image processing applications
Modern embedded systems for image processing involve increasingly complex levels of functionality under real-time and resourcerelated constraints. As this complexity increases, th...
Dong-Ik Ko, Shuvra S. Bhattacharyya
PERCOM
2008
ACM
14 years 7 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar