Sciweavers

47 search results - page 7 / 10
» pads 2006
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
ICRA
2006
IEEE
86views Robotics» more  ICRA 2006»
14 years 1 months ago
Geckobot: a Gecko Inspired Climbing Robot using Elastomer Adhesives
— In this paper, the design, analysis, and fabrication of a gecko-inspired climbing robot are discussed. The robot has kinematics similar to a gecko’s climbing gait. It uses pe...
Ozgur Unver, Ali Uneri, Alper Aydemir, Metin Sitti
PADS
2006
ACM
14 years 1 months ago
A Framework for Robust HLA-based Distributed Simulations
The High Level Architecture (HLA) is a standard for the interoperability and reuse of simulation components, referred to as federates. Large scale HLA-compliant simulations are bu...
Dan Chen, Stephen John Turner, Wentong Cai
IJON
2007
118views more  IJON 2007»
13 years 7 months ago
Low power CMOS electronic central pattern generator design for a biomimetic underwater robot
— This paper, presents a feasability study of a central pattern generator-based analog controller for an autonomous robot. The operation of a neuronal circuit formed of electroni...
Young-Jun Lee, Jihyun Lee, Kyung Ki Kim, Yong-Bin ...
ESORICS
2006
Springer
13 years 11 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang