Sciweavers

3638 search results - page 29 / 728
» Distribution chain security
Sort
View
ICALP
2005
Springer
14 years 1 months ago
Single-Key AIL-MACs from Any FIL-MAC
Abstract. We investigate a general paradigm for constructing arbitraryinput-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency para...
Ueli M. Maurer, Johan Sjödin
ISAAC
2003
Springer
101views Algorithms» more  ISAAC 2003»
14 years 27 days ago
Rapid Mixing of Several Markov Chains for a Hard-Core Model
The mixing properties of several Markov chains to sample from configurations of a hard-core model have been examined. The model is familiar in the statistical physics of the liqui...
Ravi Kannan, Michael W. Mahoney, Ravi Montenegro
TODAES
2011
107views more  TODAES 2011»
13 years 2 months ago
Scan-based attacks on linear feedback shift register based stream ciphers
—In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the linear feedback shift registers in their implementations. Alt...
Yu Liu, Kaijie Wu, Ramesh Karri
ISI
2008
Springer
13 years 7 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
IJNSEC
2008
120views more  IJNSEC 2008»
13 years 7 months ago
Formal Specification and Verification of a Secure Micropayment Protocol
As online businesses keep growing and Web services become pervasive, there is an increasing demand for micropayment protocols that facilitate microcommerce, namely selling content...
Mohamed G. Gouda, Alex X. Liu