Back to Results
First PageMeta Content



An abridged version of this paper appears in The 4th International Conference on Pairing Based Cryptography (Pairing 2010), M. Joyce, A. Miyaji and A. Otsuka (Eds.), LNCS 6487, pp, This is the full ve
Add to Reading List

Document Date: 2010-12-28 17:44:29


Open Document

File Size: 256,85 KB

Share Result on Facebook

City

Keywords Pairing / Multiple Invalid Pairing / /

Company

Fiat / GT / /

/

IndustryTerm

recursive algorithm / processor systems / tolerant networks / step baby-step algorithm / wireless systems / secure accounting / secure wireless routing protocols / e - commerce / search tree / limited wireless network / vehicular networks / exhaustive search / higher processing costs / multiplicative / Wireless networks / energy / /

MarketIndex

SET / /

Organization

Johns Hopkins University / /

Person

Law / Matt Johns / Laurel / /

Position

astF actor / actor / /

Product

M-16 / /

ProgrammingLanguage

DC / /

Technology

Cryptography / BQS algorithm / secure wireless routing protocols / SET algorithm / 7 Algorithm / The algorithm / 5 Algorithm / recursive algorithm / giant-step baby-step algorithm / /