Search
Now showing items 1-10 of 326
A Survey on How to Break Hash Functions
Year: 2008
Abstract:
With the development of hash functions family, there has also been security analysis on these functions and thereupon there have been several important cryptanalytic results for them. One of the novel approaches in this area is by Wang, Feng, Lai...
Heated ion implantation technology for FinFET application
Publisher: IEEE
Year: 2014
Soft variable structure control with differential equation for generalized systems
Publisher: IEEE
Year: 2014
Security in data forwarding through elliptic curve cryptography in cloud
Publisher: IEEE
Year: 2014
Charging optimization of battery electric vehicles including cycle battery aging
Publisher: IEEE
Year: 2014
High throughput arbitrary sample rate converter for software radios
Publisher: IEEE
Year: 2014
A novel secure and energy-efficient protocol for authentication in wireless sensor networks
Year: 2010
Abstract:
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Efficiency of WSN depends on the correctness of ...