• No se han encontrado resultados

[PDF] Top 20 Hardware architecture for pairing-based cryptography

Has 10000 "Hardware architecture for pairing-based cryptography" found on our website. Below are the top 20 most common "Hardware architecture for pairing-based cryptography".

Hardware architecture for pairing-based cryptography

Hardware architecture for pairing-based cryptography

... proposed architecture, which is expected because custom im- plementations make use of parallelization and other techniques in order to achieve faster ...more hardware resources, which is also evident in ... See full document

117

Ultra Fast Data Mining Hardware Architecture Based on Stochastic Computing

Ultra Fast Data Mining Hardware Architecture Based on Stochastic Computing

... useful for those applications requiring parallel-processing tech- niques [11 – ...the hardware used to solve each task is reduced in size if compared to tra- ditional digital ... See full document

20

Architecture based on open source hardware and software for designing a real time vehicle tracking device

Architecture based on open source hardware and software for designing a real time vehicle tracking device

... de hardware e software livre que permite o rastreamento de veículos em tem- po real apropriado às condições do país, um produto com maior funcionalidade do que o aplicado até ...de hardware e software ... See full document

13

Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard

Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard

... proposed architecture supports AES-CCM protocol, which is constituted from AESCCM module and data formatting ...iterative architecture with low hardware resources uti- lization, obtaining an AESCCMP ... See full document

13

Algorithm and hardware architecture for the discovery of frequent sequences

Algorithm and hardware architecture for the discovery of frequent sequences

... Mining patterns from a data stream is a task needed in emerging applications, such as network traffic monitoring and web click streams analysis (Jiang and Gruenwald, 2006). The very high speed and the huge amount of data ... See full document

71

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

... required for developing security solutions that protect network ...curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic ... See full document

18

SETH: A Hierarchical, Agent based Architecture for Smart Spaces

SETH: A Hierarchical, Agent based Architecture for Smart Spaces

... Similar assumptions cannot be taken regarding the security of other devices in the smart space. We cannot guarantee the physical security of switches, light bulbs or temperature sensors as we can guarantee that of the ... See full document

56

PC Based Open Control Architecture for Mechatronic Systems

PC Based Open Control Architecture for Mechatronic Systems

... el hardware (adquisición y envío de señales) por lo que además de necesitar un programa de la aplicación en Simulink, se requiere pasar dicho programa en la interfaz de usuario propia de la empresa dSpace (dSPACE ... See full document

8

Monocular-SLAM dense mapping algorithm and hardware architecture for FPGA acceleration

Monocular-SLAM dense mapping algorithm and hardware architecture for FPGA acceleration

... available for this purpose (odometers, gy- rometers, laser rangefinders, cameras, sonars, ...solutions based on: EKF (Extended Kalman filter), graph optimization and visual features are available in the ... See full document

174

FPGA-Based Wireless Sensor Node Architecture for High Performance Applications

FPGA-Based Wireless Sensor Node Architecture for High Performance Applications

... of hardware-based solutions had been avoided by the majority of WSN designers, new approaches are being opened to this kind of devices due to their much higher powerful processing ...novel ... See full document

124

A cloud based architecture for remote access to digital fabrication services for education

A cloud based architecture for remote access to digital fabrication services for education

... Surprisingly, all the research efforts put to date in the digital fabrication area have been aimed at demonstrating the effectiveness of Fab Labs in education [5] and at incorporating digital fabrication in the curricula ... See full document

8

On the implementation of a hardware architecture for an audio data hiding system

On the implementation of a hardware architecture for an audio data hiding system

... QIM based method, such as Dither Modulation, is the design of suitable quantizers used to embed the ...QIM based methods, presents lack of robustness against the gain attack, consisting in the ... See full document

12

A versatile hardware architecture for a constant false alarm rate processor based on a linear insertion sorter

A versatile hardware architecture for a constant false alarm rate processor based on a linear insertion sorter

... If the fixed threshold level is set properly, the receiver output would not exceed the threshold if only noise is present, but the receiver output would exceed this threshold if along with noise, a target is present. If ... See full document

15

Hardware architecture for adaptive filtering based on energy-CFAR processor for radar target detection

Hardware architecture for adaptive filtering based on energy-CFAR processor for radar target detection

... complement for the CFAR algorithm is presented, a time frequency analysis of radar ...custom architecture that calculates the filter coefficients according changes in the ... See full document

6

Discrete logarithms in small characteristic finite fields: attacking Type 1 pairing-based cryptography

Discrete logarithms in small characteristic finite fields: attacking Type 1 pairing-based cryptography

... estimates for the number of branches in a descent step, we assume that each distinct irreducible polynomial obtained has degree exactly m, whereas in practice many of these polynomials will have degree ... See full document

143

Image authentication scheme and its hardware architecture using watermarking and visual cryptography

Image authentication scheme and its hardware architecture using watermarking and visual cryptography

... solution for video authentication and tamper ...method for ownership verification applications. The method is useful for MPEG-4 compression that inserts the logo in a video ...The hardware ... See full document

113

System architecture for trust-based news recommenders on the web

System architecture for trust-based news recommenders on the web

... content- based and collaborative filtering. Content-based recommenders [10] are driven by the premise that user’s preferences tend to persist through ...systems based on collaborative filtering [12] ... See full document

10

Sanla, A , & Numnonda, T  (2019, July)  A Comparative Performance of Real time Big Data Analytic Architectures  In 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC) (pp  1 5)  IEEE

Sanla, A , & Numnonda, T (2019, July) A Comparative Performance of Real time Big Data Analytic Architectures In 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC) (pp 1 5) IEEE

... Lambda architecture has high accuracy and fast command ...maintenance for each layer, which is ...Kappa architecture does not include the batch layer in the architecture, presumably that many ... See full document

5

Dynamic Coordination in Fleet Management Systems: Toward Smart Cyber Fleets

Dynamic Coordination in Fleet Management Systems: Toward Smart Cyber Fleets

... available for creation, verification, and implementation of route plans is of minor ...available for verification, correction and implementation of changed route plans is scarce [8, ... See full document

10

A Simulative Comparison of BB84 Protocol with its Improved Version

A Simulative Comparison of BB84 Protocol with its Improved Version

... Quantum cryptography offers a new solution to the key distribution ...is based on principles of quantum mechanics. BB84 is a protocol for key distribution using these principles, but with the ... See full document

5

Show all 10000 documents...