Sciweavers

127 search results - page 14 / 26
» Testing Security Properties of Protocol Implementations - a ...
Sort
View
ADHOCNOW
2005
Springer
14 years 2 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
FPL
2007
Springer
154views Hardware» more  FPL 2007»
14 years 2 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...
ENGL
2007
136views more  ENGL 2007»
13 years 8 months ago
Multilayered Evolutionary Architecture for Behaviour Arbitration in Cognitive Agents
— In this work, an hybrid, self-configurable, multilayered and evolutionary subsumption architecture for cognitive agents is developed. Each layer of the multilayered architectur...
Oscar Javier Romero López
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
14 years 6 days ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
ML
2010
ACM
175views Machine Learning» more  ML 2010»
13 years 3 months ago
Concept learning in description logics using refinement operators
With the advent of the Semantic Web, description logics have become one of the most prominent paradigms for knowledge representation and reasoning. Progress in research and applica...
Jens Lehmann, Pascal Hitzler