Sciweavers

1898 search results - page 107 / 380
» Weak Keys for IDEA
Sort
View
ESWS
2009
Springer
13 years 6 months ago
Concept Search
Concept Search extends syntactic search, i.e., search based on the computation of string similarity between words, with semantic search, i.e., search based on the computation of s...
Fausto Giunchiglia, Uladzimir Kharkevich, Ilya Zai...
RE
2010
Springer
13 years 3 months ago
Dependability Arguments with Trusted Bases
An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of ...
Eunsuk Kang, Daniel Jackson
ICASSP
2011
IEEE
13 years 17 days ago
A mode preserving particle filter
A new particle filtering technique is proposed which addresses the problem of mode preservation in the approximation of multi-modal posteriors. The key is a resampling step which...
Mark R. Morelande, Alan M. Zhang
WISEC
2009
ACM
14 years 3 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
14 years 18 days ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner