Sciweavers

3451 search results - page 533 / 691
» Collaborative attack modeling
Sort
View
TCC
2010
Springer
231views Cryptology» more  TCC 2010»
14 years 6 months ago
A Domain Extender for the Ideal Cipher
We describe the first domain extender for ideal ciphers, i.e. we show a construction that is indifferentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Our construc...
Jean-Sébastien Coron, Yevgeniy Dodis, Avrad...
CCS
2009
ACM
14 years 4 months ago
CoSP: a general framework for computational soundness proofs
We describe CoSP, a general framework for conducting computational soundness proofs of symbolic models and for embedding these proofs into formal calculi. CoSP considers arbitrary...
Michael Backes, Dennis Hofheinz, Dominique Unruh
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ICRA
2008
IEEE
118views Robotics» more  ICRA 2008»
14 years 3 months ago
Enlarging regions of stable running with segmented legs
— In human and animal running spring-like leg behavior is found, and similar concepts have been demonstrated by various robotic systems in the past. In general, a spring-mass mod...
Juergen Rummel, Fumiya Iida, James Andrew Smith, A...
GLOBECOM
2007
IEEE
14 years 3 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...