نتایج جستجو برای: tesla protocol

تعداد نتایج: 257266  

Journal: :IACR Cryptology ePrint Archive 2016
Arjun Chopra

Akleylek et al. have proposed Ring-TESLA, a practical and efficient digital signature scheme based on the Ring Learning With Errors problem. However we have identified there are some problems with the parameters proposed for Ring-TESLA, as we believe they do not ensure the correct operation of the scheme and do not provide the targeted levels of security under either the provable Ring-TESLA red...

2014
François De Guio Sonia Reyes Alexandre Vignaud Marco Duering Stefan Ropele Edouard Duchesnay Hugues Chabriat Eric Jouvent

BACKGROUND AND PURPOSE Recent data suggest that early symptoms may be related to cortex alterations in CADASIL (Cerebral Autosomal-Dominant Arteriopathy with Subcortical Infarcts and Leukoencephalopathy), a monogenic model of cerebral small vessel disease (SVD). The aim of this study was to investigate cortical alterations using both high-resolution T2* acquisitions obtained with 7 Tesla MRI an...

Journal: :Seminars in Musculoskeletal Radiology 2008

Journal: :EURASIP J. Wireless Comm. and Networking 2011
Ayan Roy Chowdhury John S. Baras

We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain; keys from the chain are used for computing message authentication codes (MACs) on...

2002
PV Ramachandran

This is a short comment on the editorial on Electromagnetic Interference in Implantable Rhythm Devices The Indian Scenario in the July-September issue of the journal.1 Regarding the statement: "Systems working at 0.5 Tesla are available in the country so that it may be considered in such situations..." , though the author conveys his point, it gives reader a feeling that 0.5 Tesla magnetic reso...

2013
Jun-young Kwak Pradeep Varakantham Rajiv Maheswaran Yu-Han Chang Milind Tambe Burcin Becerik-Gerber Wendy Wood

This paper presents TESLA, an agent-based application for optimizing the energy use in commercial buildings. TESLA’s key insight is that adding flexibility to event/meeting schedules can lead to significant energy savings. TESLA provides two key contributions: (i) three online scheduling algorithms that consider flexibility of people’s preferences for energy-efficient scheduling of incrementall...

2016
Li Li Jun Sun Jin Song Dong

Time is frequently used in security protocols to provide better security. For instance, critical credentials often have limited lifetime which improves the security against brute-force attacks. However, it is challenging to correctly use time in protocol design, due to the existence of clock drift in practice. In this work, we develop a systematic method to formally specify as well as automatic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید