Sciweavers

77 search results - page 9 / 16
» Practical Large-Scale Distributed Key Generation
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
HUC
2005
Springer
14 years 1 months ago
Fast and Robust Interface Generation for Ubiquitous Applications
Abstract. We present Supple, a novel toolkit which automatically generates interfaces for ubiquitous applications. Designers need only specify declarative models of the interface a...
Krzysztof Gajos, David B. Christianson, Raphael Ho...
SIGCOMM
2004
ACM
14 years 27 days ago
The feasibility of supporting large-scale live streaming applications with dynamic application end-points
While application end-point architectures have proven to be viable solutions for large-scale distributed applications such as distributed computing and file-sharing, there is lit...
Kunwadee Sripanidkulchai, Aditya Ganjam, Bruce M. ...
IPPS
2008
IEEE
14 years 1 months ago
Massively parallel cosmological simulations with ChaNGa
Cosmological simulators are an important component in the study of the formation of galaxies and large scale structures, and can help answer many important questions about the uni...
Pritish Jetley, Filippo Gioachin, Celso L. Mendes,...
EGC
2005
Springer
14 years 1 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...