Sciweavers

401 search results - page 20 / 81
» Symmetric Subresultants and Applications
Sort
View
IEEEARES
2009
IEEE
13 years 6 months ago
Reducing the Cost of Session Key Establishment
Scenarios such as online banking, mobile payment systems, stock trading, selling merchandise, and a host of other applications that need a high level of security have moved from th...
Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi S...
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 3 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
IFIP
2010
Springer
13 years 3 months ago
Efficient Decision Procedures for Message Deducibility and Static Equivalence
Abstract. We consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. We present polynomial-time a...
Bruno Conchinha, David A. Basin, Carlos Caleiro
ICCD
2008
IEEE
194views Hardware» more  ICCD 2008»
14 years 5 months ago
Understanding performance, power and energy behavior in asymmetric multiprocessors
Abstract—Multiprocessor architectures are becoming popular in both desktop and mobile processors. Among multiprocessor architectures, asymmetric architectures show promise in sav...
Nagesh B. Lakshminarayana, Hyesoon Kim
DAGSTUHL
2006
13 years 10 months ago
Vertex reconstruction in Cayley graphs
In this report paper we collect recent results on the vertex reconstruction in Cayley graphs Cay(G, S). The problem is stated as the problem of reconstructing a vertex from the mi...
Elena V. Konstantinova