Sciweavers

868 search results - page 145 / 174
» The EAX Mode of Operation
Sort
View
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
FGR
2008
IEEE
165views Biometrics» more  FGR 2008»
13 years 7 months ago
The significance of facial features for automatic sign language recognition
Although facial features are considered to be essential for humans to understand sign language, no prior research work has yet examined their significance for automatic sign langu...
Ulrich von Agris, Moritz Knorr, Karl-Friedrich Kra...
CN
2010
90views more  CN 2010»
13 years 7 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 7 months ago
Enhanced Prolog Remote Predicate Call Protocol
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC) [1]. The Prol...
Alin Suciu, Kalman Pusztai, Andrei Diaconu
CLUSTER
2007
IEEE
13 years 7 months ago
Combining data sharing with the master-worker paradigm in the common component architecture
Abstract— Software component technologies are being accepted as an adequate solution for handling the complexity of applications. However, existing software component models tend...
Gabriel Antoniu, Hinde-Lilia Bouziane, Mathieu Jan...