Search
Now showing items 1-10 of 85
A Survey on How to Break Hash Functions
Year: 2008
Abstract:
With the development of hash functions family, there has also been security analysis on these functions and thereupon there have been several important cryptanalytic results for them. One of the novel approaches in this area is by Wang, Feng, Lai...
Heated ion implantation technology for FinFET application
Publisher: IEEE
Year: 2014
A novel secure and energy-efficient protocol for authentication in wireless sensor networks
Year: 2010
Abstract:
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Efficiency of WSN depends on the correctness of ...
Ultrafast all-optical clock recovery based on phase-only linear optical filtering
Publisher: IEEE
Year: 2014
A new signal combining algorithm based on iteration and data-aided SNR estimation for antenna arraying
Publisher: IEEE
Year: 2014
Recent Parables in Cryptography
Publisher: IEEE
Year: 2014
CoAdELL: Adaptivity and Compression for Improving Sparse Matrix-Vector Multiplication on GPUs
Publisher: IEEE
Year: 2014
SiC MOSFET based avionic power supply
Publisher: IEEE
Year: 2014
A dynamic model for study and optimization of an irreversible solar refrigerator
Publisher: IEEE
Year: 2014
On the theory of transition radiation in a waveguide with anisotropic magneto dielectric filling
Publisher: IEEE
Year: 2014