Sciweavers

894 search results - page 143 / 179
» Secure Implementation of Channel Abstractions
Sort
View
NSF
2001
Springer
225views Computer Vision» more  NSF 2001»
14 years 5 days ago
Content-Based Networking: A New Communication Infrastructure
Abstract. We argue that the needs of many classes of modern applications, especially those targeted at mobile or wireless computing, demand the services of content-based publish/su...
Antonio Carzaniga, Alexander L. Wolf
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
13 years 11 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
PKC
2010
Springer
234views Cryptology» more  PKC 2010»
13 years 9 months ago
Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
Abstract. Pairings on elliptic curves over finite fields are crucial for constructing various cryptographic schemes. The T pairing on supersingular curves over GF(3n ) is particula...
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shi...
SIGOPS
2008
156views more  SIGOPS 2008»
13 years 7 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
13 years 5 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...