Sciweavers

5722 search results - page 132 / 1145
» Security Function Interactions
Sort
View
CCS
2009
ACM
14 years 9 months ago
Universally composable contributory group key exchange
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by maliciou...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
ACISP
2010
Springer
13 years 7 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
PERCOM
2006
ACM
14 years 8 months ago
Specification of a Functional Architecture for E-Learning Supported by Wireless Technologies
This paper proposes a distributed platform designed to support pervasive learning and interactivity on a university campus and to ease tasks related to learning and teaching. The ...
Philip Grew, Francesco Giudici, Elena Pagani
SFP
2003
13 years 10 months ago
O'Camelot: adding objects to a resource-aware functional language
Abstract: We outline an object-oriented extension to Camelot, a functional language in the ML family designed for resource aware computation. Camelot is compiled for the Java Virtu...
Nicholas Wolverson, Kenneth MacKenzie
PPDP
2009
Springer
14 years 3 months ago
Session types for linear multithreaded functional programming
The construction of reliable concurrent and distributed systems is an extremely difficult endeavour. For complex systems, it requires modular development strategies based on prec...
Vasco Thudichum Vasconcelos