sa152-155.rar Sharing secrets in stego images with authentication Multimodal face and fingerprint biometrics authentication on space-limited tokens Self-synchronizing chaotic stream ciphers Authentication in stealth distributed hash tables
sa156-162.rar FPGA implementation of high performance elliptic curve cryptographic processor over GF(2^163) Secure communication in microcomputer bus systems for embedded devices Modular array structure for non-restoring square root circuit FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field Rapid design of area-efficient custom instructions for reconfigurable embedded processing A unified architecture for a public key cryptographic coprocessor Versatile multiplier architectures in GF(2^k) fields using the Montgomery multiplication algorithm
sa163-166.rar High performance set associative translation lookaside buffers for low power microprocessors Free-space quantum cryptography with quantum and telecom communication channels Event-driven service coordination for business process integration in ubiquitous enterprises On the design and implementation of a RISC processor extension for the KASUMI encryption algorithm
sa167-171.rar Evaluating workflow process designs using cohesion and coupling metrics Optimization of biomass fuelled systems for distributed power generation using Particle Swarm Optimization Qualitative temporal analysis: Towards a full implementation of the Fault Tree Handbook On the use of non-coherent fault trees in safety and security studies Enforcing memory policy specifications in reconfigurable hardware
172 Knowledge representation concepts for automated SLA management