Sciweavers

905 search results - page 67 / 181
» Public key distribution through
Sort
View
CE
2007
102views more  CE 2007»
13 years 8 months ago
ICT and learning: Lessons from Australian classrooms
Research into Information and Communication Technologies (ICT) in schools is well into its third decade but there is still a pressing need to better understand how computer-based ...
Debra N. A. Hayes
MATES
2010
Springer
13 years 7 months ago
Impact of Competition on Quality of Service in Demand Responsive Transit
Abstract. Demand responsive transportation has the potential to provide efficient public door-to-door transport with a high quality. In currently implemented systems in the Netherl...
Ferdi Grootenboers, Mathijs de Weerdt, Mahdi Zarga...
IPPS
2003
IEEE
14 years 2 months ago
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array
This paper describes a hardware architecture for modular multiplication operation which is efficient for bit-lengths suitable for both commonly used types of Public Key Cryptogra...
Siddika Berna Örs, Lejla Batina, Bart Preneel...
SIAMJO
2008
93views more  SIAMJO 2008»
13 years 8 months ago
Sufficient Second-Order Optimality Conditions for Semilinear Control Problems with Pointwise State Constraints
Second-order sufficient optimality conditions are established for the optimal control of semilinear elliptic and parabolic equations with pointwise constraints on the control and t...
Eduardo Casas, Juan Carlos de los Reyes, Fredi Tr&...
CSREASAM
2009
13 years 6 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong