Sciweavers

461 search results - page 72 / 93
» The RC5 Encryption Algorithm
Sort
View
CIBCB
2005
IEEE
14 years 1 months ago
An Internet-based Melanoma Diagnostic System - Toward the Practical Application
— In this paper, we report a practical application of world’s first internet-based melanoma diagnostic system. The system is now available from all over the world, 24 hours 36...
Hitoshi Iyatomi, Hiroshi Oka, Masahiro Hashimoto, ...
ASWEC
2007
IEEE
13 years 11 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
GLVLSI
2007
IEEE
166views VLSI» more  GLVLSI 2007»
13 years 11 months ago
Efficient pipelining for modular multiplication architectures in prime fields
This paper presents a pipelined architecture of a modular Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline implementation o...
Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid...
BIOADIT
2006
Springer
13 years 11 months ago
Packet Classification with Evolvable Hardware Hash Functions - An Intrinsic Approach
Bandwidth demands of communication networks are rising permanently. Thus, the requirements to modern routers regarding packet classification are rising accordingly. Conventional al...
Harald Widiger, Ralf Salomon, Dirk Timmermann
CN
2010
90views more  CN 2010»
13 years 7 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son