Sciweavers

26354 search results - page 107 / 5271
» How we refactor, and how we know it
Sort
View
EUROCRYPT
2005
Springer
14 years 3 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
HT
2004
ACM
14 years 3 months ago
How much is too much in a hypertext link?: investigating context and preview - a formative evaluation
A high quality of free movement, or mobility, is key to the accessibility, design, and usability of many ‘common-use’ hypermedia resources (Web sites) and key to good mobility...
Simon Harper, Yeliz Yesilada, Carole A. Goble, Rob...
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
14 years 3 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
ATAL
2003
Springer
14 years 3 months ago
How to calm hyperactive agents
System performance in multi-agent resource allocation systems can often improve if individual agents reduce their activity. Agents in such systems need a way to modulate their ind...
H. Van Dyke Parunak, Sven Brueckner, Robert S. Mat...
DRM
2003
Springer
14 years 3 months ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein