Sciweavers

1553 search results - page 265 / 311
» Democracy Functions of Information Technology
Sort
View
ISW
2007
Springer
14 years 1 months ago
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports an...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
SPIRE
2007
Springer
14 years 1 months ago
Approximate String Matching with Lempel-Ziv Compressed Indexes
Abstract. A compressed full-text self-index for a text T is a data structure requiring reduced space and able of searching for patterns P in T. Furthermore, the structure can repro...
Luís M. S. Russo, Gonzalo Navarro, Arlindo ...
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
14 years 1 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh
EDOC
2006
IEEE
14 years 1 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
IROS
2006
IEEE
108views Robotics» more  IROS 2006»
14 years 1 months ago
Basic Study on Sensory Aspects of a Master/Slave System for Force Telecommunication
– The advancement of multimedia services including audio/visual media has been rapid. The applications of cellular phones, in particular, have increased by using these technologi...
Masayuki Hara, Jian Huang, Young-Mi Jung, Tetsuro ...