Sciweavers

2009 search results - page 307 / 402
» Towards Self-Configuring Networks
Sort
View
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
14 years 1 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
HOTOS
2007
IEEE
14 years 1 months ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
DATE
2004
IEEE
134views Hardware» more  DATE 2004»
14 years 1 months ago
Application of a Multi-Processor SoC Platform to High-Speed Packet Forwarding
In this paper, we explore the requirements of emerging complex SoC's and describe StepNP, an experimental flexible, multi-processor SoC platform targeted towards communicatio...
Pierre G. Paulin, Chuck Pilkington, Essaid Bensoud...
FC
2006
Springer
99views Cryptology» more  FC 2006»
14 years 1 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
MICAI
2000
Springer
14 years 27 days ago
A Neurocontrol Scheme of a 2-DOF Manipulator Using CMAC
Artificial Neural Networks (ANN) are an emerging technology, yet, in continuous dynamic behavior, much work has been done to attempt to generate a formal method to design a contro...
Raúl Leal Ascencio, Marco A. Pérez C...