Search
نمایش تعداد 1-10 از 326
A Survey on How to Break Hash Functions
سال: 2008
خلاصه:
With the development of hash functions family, there has also been security analysis on these functions and thereupon there have been several important cryptanalytic results for them. One of the novel approaches in this area is by Wang, Feng, Lai...
Heated ion implantation technology for FinFET application
ناشر: IEEE
سال: 2014
Soft variable structure control with differential equation for generalized systems
ناشر: IEEE
سال: 2014
Security in data forwarding through elliptic curve cryptography in cloud
ناشر: IEEE
سال: 2014
Charging optimization of battery electric vehicles including cycle battery aging
ناشر: IEEE
سال: 2014
High throughput arbitrary sample rate converter for software radios
ناشر: IEEE
سال: 2014
A novel secure and energy-efficient protocol for authentication in wireless sensor networks
سال: 2010
خلاصه:
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Efficiency of WSN depends on the correctness of ...