Sciweavers

373 search results - page 13 / 75
» Two Attacks on Reduced IDEA
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 7 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim
TIT
2011
148views more  TIT 2011»
13 years 2 months ago
On Two-User Gaussian Multiple Access Channels With Finite Input Constellations
—Constellation Constrained (CC) capacity regions of two-user Single-Input Single-Output (SISO) Gaussian Multiple Access Channels (GMAC) are computed for several Non-Orthogonal Mu...
Jagadeesh Harshan, Bikash Sundar Rajan
ICDCS
1999
IEEE
13 years 12 months ago
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications
Update anywhere-anytime-anyway transactional replication has unstable behavior as the workload scales up. To reduce this problem, a two-tier replication algorithm is proposed in [...
Peng Liu, Paul Ammann, Sushil Jajodia
PAA
2007
13 years 7 months ago
Pairwise feature evaluation for constructing reduced representations
Feature selection methods are often used to determine a small set of informative features that guarantee good classification results. Such procedures usually consist of two compon...
Artsiom Harol, Carmen Lai, Elzbieta Pekalska, Robe...