DTMOS-based 1 V opamp

FREE-DOWNLOADHF Achigui, CJB Fayomi… – Electronics, Circuits and …, 2003 – In this paper, we present a new opamp based on dynamic threshold voltage (DTMOS) transistors for low voltage applications (1-V). The opamp is a two stages configuration, with differential input pairs followed by a single ended class AB output. The input stage uses DTMOS devices

Ad hoc networking with swarm intelligence

FREE-DOWNLOAD CC Shen, C Jaikaeo, C Srisathapornphat… A Routing Suite for Mobile Ad hoc Networks Us- ing Swarm Intelligence.

autonomous underwater vehicle

Data muling over underwater wireless sensor networks using an autonomous underwater vehicle FREE-DOWNLOAD M Dunbabin, P Corke, I Vasilescu… – Robotics and …, 2006 . Each node is built around a wireless sensor device developed by the CSIRO called a . over 46 muling missions locating up to 8 nodes per mission in the test tank. . underwater vehicles,” in Proceed- […]

Security in Cloud Computing

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing FREE-DOWNLOAD Q Wang, C Wang, K Ren… – Parallel and Distributed …, 2011 – Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the […]

Toward green cloud computing-02

FREE-DOWNLOADFS Chu, KC Chen… – Proceedings of the 5th International …, 2011 ABSTRACT Cloud computing is emerging as a critical information com- munication technology to heavily impact our daily life in the future. We systematically analyze its energy consump- tion based on types of services and obtain the conditions to facilitate green cloud computing

Endomorphisms for faster elliptic curve cryptography on a large class of curves

FREE-DOWNLOAD S Galbraith, X Lin… – Advances in Cryptology-EUROCRYPT 2009 Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accelerated using the Gallant-Lambert- Vanstone (GLV) method. We extend results of Iijima, Matsuo, Chao and Tsujii which give such homomorphisms for a large class of elliptic

General theory of decoy state quantum cryptography with source errors

FREE-DOWNLOAD XB Wang, CZ Peng, J Zhang, L Yang… – Physical Review A, The existing theory of decoy-state quantum cryptography assumes the exact control of each state from Alice’s source. Such exact control is impossible in practice. We develop the theory of decoy-state method so that it is unconditionally secure even if there are state errors […]

de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography

FREE-DOWNLOAD R Renner… – Physical review letters, Composite quantum systems are, in general, very hard to analyze. This is due to the exponential growth of the number of parameters required for their description with N, the number of subsystems. Under certain symmetry assumptions, however, the analysis may be vastly

Practical symmetric key cryptography on modern graphics hardware

FREE-DOWNLOAD O Harrison… – Proceedings of the 17th conference on …, Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the ability handle integers natively. This has increased the GPU’s applicability to many fields,

On cryptography with auxiliary input

FREE-DOWNLOAD Y Dodis, YT Kalai… – Proceedings of the 41st annual ACM … We study the question of designing cryptographic schemes which are secure even if an arbitrary function f(sk) of the secret key is leaked, as long as the secret key sk is still (expo- nentially) hard to compute from this auxiliary input. This […]