Sciweavers

3116 search results - page 212 / 624
» Recovering
Sort
View
SPW
2005
Springer
14 years 4 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano
TACAS
2005
Springer
106views Algorithms» more  TACAS 2005»
14 years 4 months ago
Dependent Types for Program Understanding
Abstract. Weakly-typed languages such as Cobol often force programrepresent distinct data abstractions using the same low-level physical type. In this paper, we describe a techniqu...
Raghavan Komondoor, Ganesan Ramalingam, Satish Cha...
VISUAL
2005
Springer
14 years 4 months ago
Surveying the Reality of Semantic Image Retrieval
Abstract. An ongoing project is described which seeks to add to our understanding about the real challenge of semantic image retrieval. Consideration is given to the plurality of t...
Peter G. B. Enser, Christine J. Sandom, Paul H. Le...
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
14 years 4 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the ļ¬rst multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā€...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
WISA
2005
Springer
14 years 4 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...