Sciweavers

193 search results - page 31 / 39
» Universally Composable Secure Mobile Agent Computation
Sort
View
MIDDLEWARE
2005
Springer
14 years 1 months ago
Network Processing of Documents, for Documents, by Documents
This paper presents a content-dependent and configurable framework for the network processing of documents. Like existing compound document frameworks, it enables an enriched docu...
Ichiro Satoh
AGENTS
2001
Springer
14 years 1 days ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
WS
2004
ACM
14 years 29 days ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
SAIG
2001
Springer
13 years 12 months ago
MetaKlaim: Meta-programming for Global Computing
Most foundational models for global computing have focused on the spatial dimension of computations, however global computing requires also new ways of thinking about the temporal ...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...