Sciweavers

1729 search results - page 242 / 346
» Generic Haskell: Applications
Sort
View
JOC
2010
129views more  JOC 2010»
13 years 4 months ago
Discrete Logarithm Problems with Auxiliary Inputs
Let g be an element of prime order p in an abelian group and let Zp. We show that if g, g , and gd are given for a positive divisor d of p - 1, the secret key can be computed de...
Jung Hee Cheon
SOSYM
2010
119views more  SOSYM 2010»
13 years 4 months ago
Formal specification of non-functional properties of component-based software systems
Component-based software engineering (CBSE) is viewed as an opportunity to deal with the increasing complexity of modern-day software. Along with CBSE comes the notion of component...
Steffen Zschaler
DOCENG
2011
ACM
12 years 10 months ago
Timesheets.js: when SMIL meets HTML5 and CSS3
In this paper, we explore different ways to publish multimedia documents on the web. We propose a solution that takes advantage of the new multimedia features of web standards, n...
Fabien Cazenave, Vincent Quint, Cécile Rois...
IACR
2011
292views more  IACR 2011»
12 years 9 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 5 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...