Sciweavers

2472 search results - page 110 / 495
» Parallel Key Exchange
Sort
View
141
Voted
ICICS
2010
Springer
15 years 17 days ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
138
Voted
COMPSYSTECH
2009
15 years 13 days ago
Keeping artifacts alive: towards a knowledge management system
: The paper investigates first the role of artifacts in a cooperative work environment. It shows the different types of artifacts used in work groups. Then, it stresses the charact...
Hilda Tellioglu
SCL
2011
14 years 9 months ago
Suboptimal decentralized control over noisy communication channels
In this paper we present a technique for design of decentralized controllers for mean square stability of a large scale system with cascaded clusters of subsystems. Each subsystem...
Alireza Farhadi, N. U. Ahmed
IACR
2011
255views more  IACR 2011»
14 years 2 months ago
A Standard-Model Security Analysis of TLS-DHE
TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. ...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
127
Voted
JPDC
2008
135views more  JPDC 2008»
15 years 2 months ago
Fast parallel GPU-sorting using a hybrid algorithm
This paper presents an algorithm for fast sorting of large lists using modern GPUs. The method achieves high speed by efficiently utilizing the parallelism of the GPU throughout th...
Erik Sintorn, Ulf Assarsson