Sciweavers

278 search results - page 26 / 56
» Variants of Spreading Messages
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
The Pump: A Decade of Covert Fun
This paper traces the ten plus year history of the Naval Research Laboratory’s Pump idea. The Pump was theorized, designed, and built at the Naval Research Laboratory’s Center...
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
SODA
2004
ACM
91views Algorithms» more  SODA 2004»
13 years 9 months ago
Competitive analysis of organization networks or multicast acknowledgement: how much to wait?
We study, from the competitive analysis perspective, the trade off between communication cost and delay cost (or simply the sendor-wait dilemma) on a hierarchy (rooted tree). The p...
Carlos Brito, Elias Koutsoupias, Shailesh Vaya
JOC
2008
92views more  JOC 2008»
13 years 7 months ago
Cryptanalysis of ISO/IEC 9796-1
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...
Don Coppersmith, Jean-Sébastien Coron, Fran...
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 7 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
EDCC
2005
Springer
14 years 1 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...