Sciweavers

1116 search results - page 112 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
14 years 2 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
ENTCS
2006
127views more  ENTCS 2006»
13 years 8 months ago
Component Identification Through Program Slicing
This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic c...
Nuno F. Rodrigues, Luís Soares Barbosa
WISTP
2007
Springer
14 years 2 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
RAID
2005
Springer
14 years 1 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
TSD
2009
Springer
14 years 2 months ago
Analysis and Assessment of AvID: Multi-Modal Emotional Database
The paper deals with the recording and the evaluation of a multi modal (audio/video) database of spontaneous emotions. Firstly, motivation for this work is given and different rec...
Rok Gajsek, Vitomir Struc, Bostjan Vesnicer, Anja ...