Sciweavers

19003 search results - page 188 / 3801
» We Need Assurance!
Sort
View
CCS
2006
ACM
14 years 2 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
FPL
2004
Springer
119views Hardware» more  FPL 2004»
14 years 2 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
ESORICS
2000
Springer
14 years 2 months ago
A Full Bandwidth ATM Firewall
The ATM technology has been specified to provide users with the ability to request quality of service (QoS) for their applicatio ns and to enable high speed communications. Howeve...
Olivier Paul, Maryline Laurent, Sylvain Gombault
ICSE
2000
IEEE-ACM
14 years 2 months ago
Simulation in software engineering training
Simulation is frequently used for training in many application areas like aviation and economics, but not in software engineering. We present the SESAM project which focuses on so...
Anke Drappa, Jochen Ludewig
WSC
2007
14 years 22 days ago
Modeling the performance of low latency queueing for emergency telecommunications
Event simulation and analytic modeling are used to evaluate the performance of Low Latency Queueing (LLQ), a queueing discipline available in some Internet packet switching router...
Denise M. Bevilacqua Masi, Martin J. Fischer, Davi...