Sciweavers

473 search results - page 46 / 95
» The Case for Quantum Key Distribution
Sort
View
CCS
2008
ACM
13 years 10 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
INFOCOM
2006
IEEE
14 years 2 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
EUROPAR
2006
Springer
14 years 12 days ago
Optimization of Dense Matrix Multiplication on IBM Cyclops-64: Challenges and Experiences
Abstract. This paper presents a study of performance optimization of dense matrix multiplication on IBM Cyclops-64(C64) chip architecture. Although much has been published on how t...
Ziang Hu, Juan del Cuvillo, Weirong Zhu, Guang R. ...
ESCIENCE
2007
IEEE
14 years 3 months ago
Towards a Grid-Enabled Simulation Framework for Nano-CMOS Electronics
The electronics design industry is facing major challenges as transistors continue to decrease in size. The next generation of devices will be so small that the position of indivi...
Liangxiu Han, Asen Asenov, Dave Berry, Campbell Mi...
ECML
2007
Springer
14 years 2 months ago
Source Separation with Gaussian Process Models
In this paper we address a method of source separation in the case where sources have certain temporal structures. The key contribution in this paper is to incorporate Gaussian pro...
Sunho Park, Seungjin Choi