Sciweavers

1863 search results - page 102 / 373
» Level-Based Link Analysis
Sort
View
ACISP
2005
Springer
14 years 2 months ago
Security Analysis and Fix of an Anonymous Credential System
Anonymous credentials are an important privacy-enhancing technique that allows users to convince a service provider of their legitimacy for service accesses in an anonymous manner....
Yanjiang Yang, Feng Bao, Robert H. Deng
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
14 years 2 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
ICIC
2005
Springer
14 years 2 months ago
Analysis of SCTP Handover by Movement Patterns
Stream Control Transmission Protocol (SCTP) is a new end-to-end transport protocol, which can be used to support the mobility of mobile terminals. This paper describes a framework ...
Dong Phil Kim, Seok Joo Koh, Sang Wook Kim
PET
2005
Springer
14 years 2 months ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov
HICSS
2003
IEEE
165views Biometrics» more  HICSS 2003»
14 years 2 months ago
Analysis of the Effectiveness of Global Virtual Teams in Software Engineering Projects
Global software development projects use virtual teams, which are primarily linked through computer and telecommunications technologies across national boundaries. Global Virtual ...
H. Keith Edwards, Varadharajan Sridhar