Sciweavers

1116 search results - page 153 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
BIOSIG
2008
170views Biometrics» more  BIOSIG 2008»
13 years 9 months ago
Frontex Perspectives on Biometrics for Border Checks
: The European Union is developing new concepts for border management. Biometrics is seen is a key technology to facilitate more secure and convenient border management. Biometric ...
Erik Berglund, Rasa Karbauskaite
WG
1993
Springer
13 years 12 months ago
Graphs, Hypergraphs and Hashing
Minimal perfect hash functions are used for memory efficient storage and fast retrieval of items from static sets. We present an infinite family of efficient and practical algori...
George Havas, Bohdan S. Majewski, Nicholas C. Worm...
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 8 months ago
SOSEMANUK: a fast software-oriented stream cipher
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 ...
Côme Berbain, Olivier Billet, Anne Canteaut,...
TOOLS
1999
IEEE
14 years 2 days ago
Bounding Component Behavior via Protocols
In this paper we enhance the SOFA Component Description Language with a semantic description of a component's functionality. There are two key requirements this description a...
Frantisek Plasil, Milos Besta, Stanislav Visnovsky
IMC
2007
ACM
13 years 9 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...