Sciweavers

150 search results - page 21 / 30
» LUC: A New Public Key System
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 13 days ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
14 years 1 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
ATAL
2005
Springer
14 years 1 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
JCB
2007
146views more  JCB 2007»
13 years 7 months ago
MSOAR: A High-Throughput Ortholog Assignment System Based on Genome Rearrangement
The assignment of orthologous genes between a pair of genomes is a fundamental and challenging problem in comparative genomics, since many computational methods for solving variou...
Zheng Fu, Xin Chen, Vladimir Vacic, Peng Nan, Yang...
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 1 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng