Sciweavers

541 search results - page 105 / 109
» A generic attack to ciphers
Sort
View
IWFM
2003
13 years 9 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
JOC
2008
97views more  JOC 2008»
13 years 7 months ago
Tag-KEM/DEM: A New Framework for Hybrid Encryption
This paper presents a novel framework for the generic construction of hybrid encryption schemes which produces more efficient schemes than the ones known before. A previous framew...
Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa
CTW
2002
91views more  CTW 2002»
13 years 7 months ago
Can We Ever Escape from Data Overload? A Cognitive Systems Diagnosis
ive. This characterization leads to model-based abstractions and representation design techniques as potential solutions. Many of the existing approaches to coping with data overlo...
David D. Woods, Emily S. Patterson, Emilie M. Roth
ICASSP
2011
IEEE
12 years 11 months ago
ECG for blind identity verification in distributed systems
This paper discusses ECG biometric recognition in a distributed system, such as smart cards. In a setting where every card is equipped with an ECG sensor to record heart beats fro...
Jiexin Gao, Foteini Agrafioti, Hoda Mohammadzade, ...
EUROCRYPT
2009
Springer
14 years 8 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...