Sciweavers

5722 search results - page 148 / 1145
» Security Function Interactions
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
IEICET
2011
13 years 5 months ago
The Security of Abreast-DM in the Ideal Cipher Model
Abstract. In this paper, we give a security proof for Abreast-DM in terms of collision resistance and preimage resistance. As old as Tandem-DM, the compression function Abreast-DM ...
Jooyoung Lee, Daesung Kwon
IAT
2006
IEEE
14 years 4 months ago
Dynamic Service Composition and Selection through an Agent Interaction Protocol
This paper addresses the dynamic service selection and composition issues for the satisfaction of user requirements. We propose an approach in which agents perform service composi...
Yasmine Charif-Djebbar, Nicolas Sabouret
IFL
2004
Springer
14 years 3 months ago
The Feasibility of Interactively Probing Quiescent Properties of GUI Applications
In this paper we explore how application-users can, in an interactive way, test properties about the state of GUI applications that can be classified as local state transition sys...
Peter Achten
AAAI
2008
14 years 11 days ago
Generalized Point Based Value Iteration for Interactive POMDPs
We develop a point based method for solving finitely nested interactive POMDPs approximately. Analogously to point based value iteration (PBVI) in POMDPs, we maintain a set of bel...
Prashant Doshi, Dennis Perez