To search, Click below search items.

 

All Published Papers Search Service

Results for Cryptography; Total 10374

Title

Timed Weak Simulation Verification and its application to Stepwise Refinement of Real-Time Software

Author

Satoshi Yamane

Citation

Vol. 6  No. 1  pp. 192~203

Keywords

Refinement Design Method, Real-Time Software, Timed Weak Simulation Relation, Verification, Real-Time Scheduling


Title

Security Extension for Bresson-Chevassut-Pointcheval's model

Author

Chunjie Cao, Jianfeng Ma, Sangjae Moon

Citation

Vol. 6  No. 1  pp. 184~191

Keywords

Provable security, Distributed computing, Formal model, Multicast security


Title

High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks

Author

Turki F. Al-Somani, M. K. Ibrahim

Citation

Vol. 6  No. 1  pp. 177~183

Keywords

Elliptic Curves Cryptosystems, Mixed Coordinates, Parallel Designs, Normal Basis


Title

Design of Secure Clustering Routing Protocol using SNEP and ?TESLA on Sensor Network Communication

Author

Kun-Won Jang, Woo-sik Jung, Dong-kyu Shin, Moon-Seog Jun

Citation

Vol. 6  No. 1  pp. 171~176

Keywords

Sensor network, Key management, Clustering, Energy savings


[1] ... [prev] [2581] [2582] [2583] [2584] [2585] [2586] [2587] [2588] [2589] [2590] [next] ... [2594]