Sciweavers

1801 search results - page 179 / 361
» Implementation-Oriented Secure Architectures
Sort
View
127
Voted
HSNMC
2004
Springer
165views Multimedia» more  HSNMC 2004»
15 years 9 months ago
An Architecture for User Location in Heterogeneous Mobile Networks
Fourth generation mobile networks will allow end-users to roam over different network technologies, such as UMTS, CDMA2000 and Wi-Fi. These mobile networks make it possible to dete...
Maarten Wegdam, Jeroen van Bemmel, Ko Lagerberg, P...
102
Voted
GI
2001
Springer
15 years 8 months ago
Towards a Novel Architecture to Support Universal Location Awareness
—The rapid advances in a wide range of wireless access technologies along with an industry-wide IP-convergence have set up the stage for context-aware computing. The “locationâ...
Amiya Bhattacharya, Abhishek Roy, Sajal K. Das
141
Voted
GLVLSI
2007
IEEE
166views VLSI» more  GLVLSI 2007»
15 years 7 months ago
Efficient pipelining for modular multiplication architectures in prime fields
This paper presents a pipelined architecture of a modular Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline implementation o...
Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid...
123
Voted
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
15 years 5 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
134
Voted
JCP
2008
87views more  JCP 2008»
15 years 3 months ago
VLSI Architecture of a Cellular Automata based One-Way Function
In this paper, a technique to generate expander graphs using Cellular Automata (CA) has been presented. The special class of CA, known as the Two Predecessor Single Attractor Cellu...
Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy...