Sciweavers

634 search results - page 63 / 127
» Groundwork for Weak Analysis
Sort
View
105
Voted
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
We initiate a complexity-theoretic treatment of hardness amplification for collision-resistant hash functions, namely the transformation of weakly collision-resistant hash functio...
Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca T...
131
Voted
IH
2007
Springer
15 years 9 months ago
A Fusion of Maximum Likelihood and Structural Steganalysis
Abstract. This paper draws together two methodologies for the detection of bit replacement steganography: the principle of maximum likelihood, which is statistically well-founded b...
Andrew D. Ker
106
Voted
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 9 months ago
Cooperation in Group-Buying Auctions
Cooperation among bidders in traditional auctions is generally forbidden because it is harmful to the interests of sellers. However, in a new type of online auction, the group-buy...
Jian Chen, Xilong Chen, Robert J. Kauffman, Xiping...
135
Voted
CAV
2005
Springer
122views Hardware» more  CAV 2005»
15 years 9 months ago
Interpolant-Based Transition Relation Approximation
Abstract. In predicate abstraction, exact image computation is problematic, requiring in the worst case an exponential number of calls to a decision procedure. For this reason, sof...
Ranjit Jhala, Kenneth L. McMillan
149
Voted
DSVIS
2005
Springer
15 years 9 months ago
Mapping ConcurTaskTrees into UML 2.0
Abstract. The ConcurTaskTrees (CTT) is one of the most widely used notations for task modeling, specifically tailored for user interface model-based design. The integration of CTT ...
Leonel Nóbrega, Nuno Jardim Nunes, Helder C...