Sciweavers

5722 search results - page 101 / 1145
» Security Function Interactions
Sort
View
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
CLADE
2003
IEEE
14 years 2 months ago
Autonomic Optimization of an Oil Reservoir using Decentralized Services
The Grid community is actively working on defining, deploying and standardizing protocols, mechanisms, and infrastructure to support decentralized, seamless, and secure interacti...
Vincent Matossian, Manish Parashar
AGENTS
2000
Springer
14 years 14 days ago
Learning to Trust
Abstract. Evolutionary game-theory is a powerful tool to investigate the development of complex relations between individuals such as the emergence of cooperation and trust. But th...
Andreas Birk 0002
FSE
2006
Springer
107views Cryptology» more  FSE 2006»
14 years 15 days ago
Some Plausible Constructions of Double-Block-Length Hash Functions
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit output using a component function with n-bit output. The component function is either...
Shoichi Hirose
OOPSLA
2000
Springer
14 years 12 days ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang