Sciweavers

7924 search results - page 68 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
14 years 12 days ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
ESANN
2004
13 years 10 months ago
Linearization identification and an application to BSS using a SOM
The one-dimensional functional equation g(y(t)) = cg(z(t)) with known functions y and z and constant c is considered. The indeterminacies are calculated, and an algorithm for appro...
Fabian J. Theis, Elmar Wolfgang Lang
IJBC
2008
95views more  IJBC 2008»
13 years 8 months ago
Time Scaling of Chaotic Systems: Application to Secure Communications
The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preservi...
Donatello Materassi, Michele Basso
ER
2007
Springer
279views Database» more  ER 2007»
14 years 3 months ago
SimEval - A Tool for Evaluating the Quality of Similarity Functions
Approximate data matching applications typically use similarity functions to quantify the degree of likeness between two data instances. There are several similarity functions ava...
Carlos A. Heuser, Francisco N. A. Krieser, Viviane...
USENIX
2000
13 years 10 months ago
Dynamic Function Placement for Data-Intensive Cluster Computing
Optimally partitioning application and filesystem functionality within a cluster of clients and servers is a difficult problem due to dynamic variations in application behavior, r...
Khalil Amiri, David Petrou, Gregory R. Ganger, Gar...