Sciweavers

515 search results - page 70 / 103
» Secure Parameters for SWIFFT
Sort
View
OOPSLA
1997
Springer
14 years 1 months ago
Parasitic Methods: An Implementation of Multi-Methods for Java
In an object-oriented programming language, method selection is (usually) done at run-time using the class of the receiver. Some object-orientedlanguages(such as CLOS) have multi-...
John Boyland, Giuseppe Castagna
ACISP
2007
Springer
14 years 1 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
ACSAC
2001
IEEE
14 years 20 days ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
EUROCRYPT
2000
Springer
14 years 19 days ago
Efficient Receipt-Free Voting Based on Homomorphic Encryption
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote, and hence thwart vote-buying and coercion. We analyze the security of the multi-authority ...
Martin Hirt, Kazue Sako
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 11 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin