Sciweavers

12741 search results - page 73 / 2549
» Editorial and call for papers
Sort
View
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
14 years 1 months ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
CSE
2009
IEEE
14 years 1 months ago
Quantifying Reciprocity in Social Networks
In this paper we propose a new reciprocity index for quantifying social relationships based on mobile phone call detail records and Twitter blogs. We use this reciprocity index to ...
Huiqi Zhang, Ram Dantu, João W. Cangussu
PRDC
1999
IEEE
14 years 1 months ago
Availability and Performance Evaluation for Automatic Protection Switching in TDMA Wireless System
In this paper, we compare the availability and performance of a wireless TDMA system with and without automatic protection switching. Stochastic reward net models are constructed ...
Hairong Sun, Yonghuan Cao, Kishor S. Trivedi, Jame...
RTSS
1998
IEEE
14 years 1 months ago
Efficient Object Sharing in Quantum-Based Real-Time Systems
We consider the problem of implementing shared objects in uniprocessor and multiprocessor real-time systems in which tasks are executed using a scheduling quantum. In most quantum...
James H. Anderson, Rohit Jain, Kevin Jeffay
EUROCRYPT
1998
Springer
14 years 1 months ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung