Sciweavers

3420 search results - page 620 / 684
» A Language-Based Approach to Security
Sort
View
83
Voted
CRYPTO
2006
Springer
107views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Cryptanalysis of 2R- Schemes
Abstract. In this paper, we study the security of 2Rschemes [17,18], which are the "minus variant" of two-round schemes. This variant consists in removing some of the n p...
Jean-Charles Faugère, Ludovic Perret
142
Voted
ESAS
2006
Springer
15 years 6 months ago
Impact of Pseudonym Changes on Geographic Routing in VANETs
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and priv...
Elmar Schoch, Frank Kargl, Tim Leinmüller, St...
148
Voted
EUROCRYPT
2006
Springer
15 years 6 months ago
The Function Field Sieve in the Medium Prime Case
In this paper, we study the application of the function field sieve algorithm for computing discrete logarithms over finite fields of the form Fqn when q is a medium-sized prime po...
Antoine Joux, Reynald Lercier
121
Voted
IWAN
2000
Springer
15 years 6 months ago
Active Networking Means Evolution (or Enhanced Extensibility Required)
The primary goal of active networking is to increase the pace of network evolution. The approach to achieving this goal, as well as the goal of enhancing customizability, is to al...
Michael W. Hicks, Scott Nettles
135
Voted
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 6 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko