Sciweavers

17789 search results - page 159 / 3558
» Exceptional Use Cases
Sort
View
FSE
2007
Springer
105views Cryptology» more  FSE 2007»
15 years 9 months ago
New Bounds for PMAC, TMAC, and XCBC
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Kazuhiko Minematsu, Toshiyasu Matsushima
77
Voted
ECSQARU
2005
Springer
15 years 9 months ago
Symmetric Argumentation Frameworks
This paper is centered on the family of Dung’s finite argumentation frameworks when the attacks relation is symmetric (and nonempty and irreflexive). We show that while this fa...
Sylvie Coste-Marquis, Caroline Devred, Pierre Marq...
116
Voted
INDOCRYPT
2005
Springer
15 years 9 months ago
Cryptanalysis of the Quadratic Generator
Let p be a prime and let a and c be integers modulo p. The quadratic congruential generator (QCG) is a sequence (vn) of pseudorandom numbers defined by the relation vn+1 ≡ av2 n...
Domingo Gómez, Jaime Gutierrez, Álva...
109
Voted
VLDB
2004
ACM
103views Database» more  VLDB 2004»
15 years 9 months ago
Maintenance of Spatial Semijoin Queries on Moving Points
In this paper, we address the maintenance of spatial semijoin queries over continuously moving points, where points are modeled as linear functions of time. This is analogous to t...
Glenn S. Iwerks, Hanan Samet, Kenneth P. Smith
111
Voted
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
15 years 9 months ago
Architecture of a Mobile Internet
In this paper, we outline the next major evolution of the Internet architecture, where support for mobility is not the exception but the typical case. We show which parts of the I...
Dick Schefström