Sciweavers

26071 search results - page 5165 / 5215
» Making the
Sort
View
IACR
2011
106views more  IACR 2011»
12 years 8 months ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
IACR
2011
125views more  IACR 2011»
12 years 8 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
ICC
2011
IEEE
239views Communications» more  ICC 2011»
12 years 8 months ago
The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors
—Location information of nodes is the basis for many applications in wireless sensor networks (WSNs). However, most previous localization methods make the unrealistic assumption:...
Yuanfang Chen, Lei Shu, Mingchu Li, Ziqi Fan, Lei ...
ICDCS
2011
IEEE
12 years 8 months ago
E-Shadow: Lubricating Social Interaction Using Mobile Phones
—In this paper, we propose E-Shadow, a distributed mobile phone-based local social networking system. E-Shadow has two main components: (1) Local profiles. They enable EShadow u...
Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Do...
AOSD
2012
ACM
12 years 4 months ago
Reusing non-functional concerns across languages
Emerging languages are often source-to-source compiled to mainstream ones, which offer standardized, fine-tuned implementations of non-functional concerns (NFCs)—including pers...
Myoungkyu Song, Eli Tilevich
« Prev « First page 5165 / 5215 Last » Next »