Sciweavers

5722 search results - page 99 / 1145
» Security Function Interactions
Sort
View
MSE
2000
IEEE
133views Hardware» more  MSE 2000»
14 years 1 months ago
Multimodal Presentation Markup Language MPML With Emotion Expression Functions Attached
With the increase of multimedia contents in the WWW, multimodal presentation using interactive life-like agents is attractive and becoming important. However, it is not easy for m...
Yuan Zong, Hiroshi Dohi, Mitsuru Ishizuka
PAAMS
2010
Springer
13 years 6 months ago
Improving Functionalities in a Multi-agent Architecture for Ocean Monitoring
This paper presents an improved version of a multiagent architecture aimed at providing solutions for monitoring the interaction between the atmosphere and the ocean. The ocean sur...
Fernando de la Prieta, Óscar Gil, Carolina ...
ACSAC
2009
IEEE
14 years 3 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen
ACISP
2003
Springer
14 years 2 months ago
New Constructions for Resilient and Highly Nonlinear Boolean Functions
Abstract. We explore three applications of geometric sequences in constructing cryptographic Boolean functions. First, we construct 1-resilient functions of n Boolean variables wit...
Khoongming Khoo, Guang Gong
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...