To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10626

Title

Timed Weak Simulation Verification and its application to Stepwise Refinement of Real-Time Software

Author

Satoshi Yamane

Citation

Vol. 6  No. 1  pp. 192~203

Keywords

Refinement Design Method, Real-Time Software, Timed Weak Simulation Relation, Verification, Real-Time Scheduling


Title

Security Extension for Bresson-Chevassut-Pointcheval's model

Author

Chunjie Cao, Jianfeng Ma, Sangjae Moon

Citation

Vol. 6  No. 1  pp. 184~191

Keywords

Provable security, Distributed computing, Formal model, Multicast security


Title

High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks

Author

Turki F. Al-Somani, M. K. Ibrahim

Citation

Vol. 6  No. 1  pp. 177~183

Keywords

Elliptic Curves Cryptosystems, Mixed Coordinates, Parallel Designs, Normal Basis


Title

Design of Secure Clustering Routing Protocol using SNEP and ?TESLA on Sensor Network Communication

Author

Kun-Won Jang, Woo-sik Jung, Dong-kyu Shin, Moon-Seog Jun

Citation

Vol. 6  No. 1  pp. 171~176

Keywords

Sensor network, Key management, Clustering, Energy savings


[1] ... [prev] [2641] [2642] [2643] [2644] [2645] [2646] [2647] [2648] [2649] [2650] [next] ... [2657]