Sciweavers

3483 search results - page 41 / 697
» Forward
Sort
View
103
Voted
RECONFIG
2008
IEEE
156views VLSI» more  RECONFIG 2008»
15 years 9 months ago
Forward-Secure Content Distribution to Reconfigurable Hardware
Confidentiality and integrity of bitstreams and authenticated update of FPGA configurations are fundamental to trusted computing on reconfigurable technology. In this paper, we pr...
David Champagne, Reouven Elbaz, Catherine H. Gebot...
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
15 years 8 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
CSFW
2005
IEEE
15 years 8 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
15 years 8 months ago
An Efficient Architecture for Lifting-Based Forward and Inverse Discrete Wavelet Transform
In this research, an architecture that performs both forward and inverse lifting-based discrete wavelet transform is proposed. The proposed architecture reduces the hardware requi...
S. Mayilavelane Aroutchelvame, Kaamran Raahemifar
KR
2004
Springer
15 years 7 months ago
Improving the Forward Chaining Algorithm for Conceptual Graphs Rules
Simple Conceptual Graphs (SGs) are used to represent entities and relations between these entities: they can be translated into positive, conjunctive, existential first-order log...
Jean-François Baget