Sciweavers

8009 search results - page 121 / 1602
» cans 2005
Sort
View
AINA
2005
IEEE
15 years 10 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
AINA
2005
IEEE
15 years 10 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
ASYNC
2005
IEEE
90views Hardware» more  ASYNC 2005»
15 years 10 months ago
SEU-Tolerant QDI Circuits
This paper addresses the issue of Single-Event Upset (SEU) in quasi delay-insensitive (QDI) asynchronous circuits. We show that an SEU can cause abnormal computations in QDI circu...
Wonjin Jang, Alain J. Martin
ATS
2005
IEEE
132views Hardware» more  ATS 2005»
15 years 10 months ago
Concurrent Test Generation
We define a new type of test, called “concurrent test,” for a combinational circuit. Given a set of target faults, a concurrent-test is an input vector that detects all (or m...
Vishwani D. Agrawal, Alok S. Doshi
CAMP
2005
IEEE
15 years 10 months ago
Prey-Predator Strategies in a Multiagent System
— This paper describes the prey-predator multiagent hich can be considered as an abstraction of more complex real-world models. Both the prey and the predators are considered as ...
B. Lenzitti, Domenico Tegolo, Cesare Valenti