Sciweavers

2421 search results - page 178 / 485
» Message from the Co-Chairs
Sort
View
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
ECLIPSE
2007
ACM
14 years 1 months ago
Porting a distributed meeting system to the Eclipse communication framework
eConference is a text-based conferencing tool that supports distributed teams in need for synchronous communication and structured discussion services. Other than offering communi...
Fabio Calefato, Filippo Lanubile, Mario Scalas
ECBS
2009
IEEE
101views Hardware» more  ECBS 2009»
14 years 1 months ago
Structured Formalization of Service-Oriented Specifications
We present and formalize concepts for the structured specification of system behavior based on services. Services are patterns of interaction between reactive components, thus sup...
Markus Herrmannsdoerfer, Sabine Rittmann, Bernhard...
GLOBECOM
2007
IEEE
14 years 1 months ago
Resource Efficient Survivable Clustering for Wireless Sensor Networks
Abstract-- In this paper, we address both lifetime and survivability issues in wireless sensor networks (WSNs). We present an easy-to-implement clustering method called DED (distri...
Mohammad Masud Hasan, Jason P. Jue
ACISP
2006
Springer
14 years 1 months ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao