Learn More
Appendix 279 The technological and economic potential to reduce greenhouse gas (GHG) emissions is large enough to hold annual global greenhouse gas emissions to levels close to or even below those of 2000 by 2010 and even lower by 2020. Realization of these reductions requires combined actions in all sectors of the economy including adoption of(More)
Public key encryption was first introduced by Diffie and Hellman in 1976. Since then, the Diffie-Hellman key exchange protocol has been used in developing public key systems such as Rivest-Shamir-Adleman and elliptic curve cryptography. Chaotic functions, so far, have been used for symmetric cryptography only. In this Letter we propose, for the first time,(More)
In wireless sensor networks due to the small transmission distances involved, the computation energy along with the radio energy determines the battery life. Energy consumption of error control codes (ECCs) is a complex function of the energy consumption in computing encoding-decoding, transmitting "redundant" bits and energy saved by coding gain. This(More)