Displaying 25261 - 25270 of 37920

Techniques have recently been proposed by which a device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immun

There have been many proposals in recent years for password-authenticated key exchange protocols, i.e., protocols in which two parties who share only a short secret password perform a key exchange

Many technical advances were needed to realize fiber capacity increases and multiuser networking.

Multi-layer networks are networks in which several protocols may coexist at different layers.

Carrier-grade networks have often multiple layers of protocols.

Carrier-grade networks comprise several layers where different protocols coexist.

We introduce a problem directly inspired by its application to DWDM ({em dense wavelength division multiplexing}) network design. We are given a set of demands to be carried over a network.

A differential algorithm for concurrent simulation of path delay faults in sequential circuits is presented.

The geometric rotation of the polarization angle in a cylindrical optical fiber is obtained for arbitrary fiber paths, in terms of the solid angle subtended by the tangent vector of the path.

A new coded cooperation scheme is proposed to efficiently enhance the error correction capability for multi-hop path diversity.