Sciweavers

987 search results - page 22 / 198
» Key Characteristics of Hymns
Sort
View
KBSE
2008
IEEE
14 years 1 months ago
Exploring the composition of unit test suites
In agile software development, test code can considerably contribute to the overall source code size. Being a valuable asset both in terms of verification and documentation, the ...
Bart Van Rompaey, Serge Demeyer
CSFW
1999
IEEE
13 years 11 months ago
Mixed Strand Spaces
Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related proble...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
ITCC
2005
IEEE
14 years 1 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
IACR
2011
161views more  IACR 2011»
12 years 7 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
IACR
2011
113views more  IACR 2011»
12 years 7 months ago
Fully Homomorphic SIMD Operations
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations...
Nigel P. Smart, Frederik Vercauteren