Sciweavers

1005 search results - page 105 / 201
» Practical Secure Function Evaluation
Sort
View
AGENTS
2000
Springer
14 years 2 months ago
Capability-based agent matchmaking
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
TMI
2010
155views more  TMI 2010»
13 years 4 months ago
3D Forward and Back-Projection for X-Ray CT Using Separable Footprints
The greatest impediment to practical adoption of iterative methods for X-ray CT is the computation burden of cone-beam forward and back-projectors. Moreover, forward and back-proje...
Yong Long, Jeffrey A. Fessler, James M. Balter
INFOCOM
2000
IEEE
14 years 1 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
IACR
2011
182views more  IACR 2011»
12 years 9 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi