Sciweavers

1005 search results - page 16 / 201
» Practical Secure Function Evaluation
Sort
View
CCS
2003
ACM
14 years 24 days ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
IEICET
2008
113views more  IEICET 2008»
13 years 7 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
ICANNGA
2007
Springer
120views Algorithms» more  ICANNGA 2007»
14 years 1 months ago
Evolutionary Approach to the Game of Checkers
A new method of genetic evolution of linear and nonlinear evaluation functions in the game of checkers is presented. Several practical issues concerning application of genetic algo...
Magdalena Kusiak, Karol Waledzik, Jacek Mandziuk
PERCOM
2007
ACM
14 years 7 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
PPSN
2004
Springer
14 years 28 days ago
An Improved Evaluation Function for the Bandwidth Minimization Problem
This paper introduces a new evaluation function, called δ, for the Bandwidth Minimization Problem for Graphs (BMPG). Compared with the classical β evaluation function used, our ...
Eduardo Rodriguez-Tello, Jin-Kao Hao, Jose Torres-...