Sciweavers

556 search results - page 84 / 112
» Generic Properties of Datatypes
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
ISSAC
2007
Springer
132views Mathematics» more  ISSAC 2007»
14 years 1 months ago
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
LADS
2007
Springer
14 years 1 months ago
Goal Selection Strategies for Rational Agents
In agent theory and agent programming, goals constitute the motivational attitude of rational agents and form the key concept in explaining and generating their pro-active behavior...
Nick A. M. Tinnemeier, Mehdi Dastani, John-Jules C...
CSFW
2006
IEEE
14 years 1 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
MIR
2006
ACM
354views Multimedia» more  MIR 2006»
14 years 1 months ago
Constant tangential angle elected interest points
This paper presents a new interest points detector whose goal is to better catch visual attention than standard detectors. It is based on the generalization of Loy and Zelinsky tr...
Ahmed Rebai, Alexis Joly, Nozha Boujemaa