Sciweavers

1005 search results - page 80 / 201
» Practical Secure Function Evaluation
Sort
View
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 3 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
ICC
2007
IEEE
14 years 3 months ago
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Joel O. Sandin, Bilal Khan
VTC
2010
IEEE
147views Communications» more  VTC 2010»
13 years 7 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
14 years 3 months ago
Producing Collisions for Panama, Instantaneously
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
Joan Daemen, Gilles Van Assche
CANDC
2005
ACM
13 years 8 months ago
Assessment of chemical libraries for their druggability
High throughput virtual screening is acknowledged as the initial means for identifying hit compounds that will be eventually transformed to leads or drug candidates. To improve qu...
Suzanne W. Sirois, George Hatzakis, Dongqing Wei, ...