Sciweavers

859 search results - page 56 / 172
» The Changing Face of Cryptography
Sort
View
LEGE
2003
87views Education» more  LEGE 2003»
13 years 9 months ago
The Triangle Teacher - Pupil - Knowledge in E-Learning Environment
Our proposal starts from the study of the epistemological statute of the didactics of the mathematics (Henry, 1991; D’Amore, 1999), which faces the phenomenon of learning fromthe...
CGF
2007
126views more  CGF 2007»
13 years 7 months ago
A Lagrangian Approach to Dynamic Interfaces through Kinetic Triangulation of the Ambient Space
In this paper, we propose a robust and efficient Lagrangian approach for modeling dynamic interfaces between different materials undergoing large deformations and topology change...
Jean-Philippe Pons, Jean-Daniel Boissonnat
FPL
2004
Springer
119views Hardware» more  FPL 2004»
13 years 11 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
ISJGP
2010
13 years 4 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 1 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...