Sciweavers

3052 search results - page 186 / 611
» Weakly Distributive Domains
Sort
View
HICSS
1999
IEEE
112views Biometrics» more  HICSS 1999»
15 years 9 months ago
Defining Uniform and Hybrid Memory Consistency Models on a Unified Framework
The behavior of Distributed Shared Memory Systems is dictated by the Memory Consistency Model. Several Memory Consistency Models have been proposed in the literature and they fit ...
Alba Cristina Magalhaes Alves de Melo
NDSS
1999
IEEE
15 years 9 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu
160
Voted
UML
1999
Springer
15 years 9 months ago
Closing the Gap Between Object-Oriented Modeling of Structure and Behavior
The UML as standardized language for visual object-oriented modeling allows to capture the requirements as well as the structure and behavior of complex software systems. With the ...
Holger Giese, Jörg Graf, Guido Wirtz
FSE
1997
Springer
210views Cryptology» more  FSE 1997»
15 years 8 months ago
Partitioning Cryptanalysis
Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called. This attack exploits a weakness that can be described by an e ective partition-pa...
Carlo Harpes, James L. Massey
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
15 years 8 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar