Sciweavers

610 search results - page 60 / 122
» Predicate-Based Key Exchange
Sort
View
HOST
2009
IEEE
14 years 3 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
ICCCN
2007
IEEE
14 years 3 months ago
SpotMAC: A Pencil-Beam MAC for Wireless Mesh Networks
Abstract— Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and henc...
Kwan-Wu Chin
SPC
2005
Springer
14 years 2 months ago
Ephemeral Pairing on Anonymous Networks
The ephemeral pairing problem requires two or more specific physical nodes in a wireless broadcast network, that do not yet know each other, to establish a short-term relationship...
Jaap-Henk Hoepman
APSEC
2000
IEEE
14 years 1 months ago
An adaptive distributed workflow system framework
Workflow management systems are increasingly used to assist the automation of business processes that involve the exchange of documents, information, or task execution results. Re...
Martin K. Purvis, Maryam Purvis, Selena Lemalu
ARITH
1999
IEEE
14 years 1 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter