Techniques have recently been proposed by which a device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immun
There have been many proposals in recent years for password-authenticated key exchange protocols, i.e., protocols in which two parties who share only a short secret password perform a key exchange
Many technical advances were needed to realize fiber capacity increases and multiuser networking.
Multi-layer networks are networks in which several protocols may coexist at different layers.
Carrier-grade networks have often multiple layers of protocols.
Carrier-grade networks comprise several layers where different protocols coexist.
We introduce a problem directly inspired by its application to DWDM ({em dense wavelength division multiplexing}) network design. We are given a set of demands to be carried over a network.
A differential algorithm for concurrent simulation of path delay faults in sequential circuits is presented.
The geometric rotation of the polarization angle in a cylindrical optical fiber is obtained for arbitrary fiber paths, in terms of the solid angle subtended by the tangent vector of the path.
A new coded cooperation scheme is proposed to efficiently enhance the error correction capability for multi-hop path diversity.