Sciweavers

5114 search results - page 863 / 1023
» Complex networks
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
Impossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differ...
Jiali Choy, Huihui Yap
LION
2009
Springer
145views Optimization» more  LION 2009»
14 years 3 months ago
A Variable Neighborhood Descent Search Algorithm for Delay-Constrained Least-Cost Multicast Routing
Abstract. The rapid evolution of real-time multimedia applications requires Quality of Service (QoS) based multicast routing in underlying computer networks. The constrained Steine...
Rong Qu, Ying Xu, Graham Kendall
MHCI
2009
Springer
14 years 3 months ago
Using semantic descriptions for adaptive mobile games UIs
Mobile devices became powerful recently and wireless Internet access is becoming standard. One important class of networked, mobile applications are location based games, making e...
Pascal Bihler, Holger Mügge, Mark Schmatz, Ar...
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
14 years 3 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
DEBS
2009
ACM
14 years 3 months ago
Distributed agent environments in the Ambient Event Calculus
We study the development of distributed agent environments as distributed event-based systems specified in the Ambient Event Calculus (AEC). The AEC is a logic-based formalism th...
Stefano Bromuri, Kostas Stathis