Sciweavers

488 search results - page 59 / 98
» Policy-Based Cryptography and Applications
Sort
View
IAJIT
2006
145views more  IAJIT 2006»
13 years 8 months ago
Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers
In this paper, a fast hardware architecture for elliptic curve cryptography computation in Galois Field GF(p) is proposed. The architecture is implemented for 160-bits, as its dat...
Adnan Abdul-Aziz Gutub
SETA
2010
Springer
164views Mathematics» more  SETA 2010»
13 years 6 months ago
Synchronization of Boolean Dynamical Systems: A Spectral Characterization
Abstract. In this paper a spectral characterization of the synchronization property of Boolean dynamical systems is provided. Conditions on the spectrum of the next-state function ...
Jérémy Parriaux, Philippe Guillot, G...
MASS
2010
110views Communications» more  MASS 2010»
13 years 6 months ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
PERCOM
2010
ACM
13 years 6 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
CORR
2011
Springer
180views Education» more  CORR 2011»
13 years 2 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak