Sciweavers

515 search results - page 76 / 103
» Secure Parameters for SWIFFT
Sort
View
ISCIS
2004
Springer
14 years 2 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
ASIACRYPT
2003
Springer
14 years 2 months ago
Cryptanalysis of 3-Pass HAVAL
HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its has a structure that is quite similar to other well-known hash functions such as MD4 and...
Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos...
GRID
2003
Springer
14 years 2 months ago
From Web Services to OGSA: Experiences in Implementing an OGSA-based Grid Application
In previous work we have presented the ZENTURIO experiment management system for performance and parameter studies of parallel and distributed applications on cluster and Grid arc...
Radu Prodan, Thomas Fahringer
ICCS
2001
Springer
14 years 1 months ago
Supporting Car-Parrinello Molecular Dynamics with UNICORE
This paper presents the integration of application specific interfaces in the UNICORE Grid infrastructure. UNICORE provides a seamless and secure mechanism to access distributed s...
Valentina Huber
COOPIS
2000
IEEE
14 years 1 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...