Sciweavers

1275 search results - page 128 / 255
» time 1998
Sort
View
ASIACRYPT
1998
Springer
14 years 1 months ago
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers
Rijmen and Preneel recently proposed for the rst time a family of trapdoor block ciphers 8]. In this family of ciphers, a trapdoor is hidden in S-boxes and is claimed to be undetec...
Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
IUI
1998
ACM
14 years 1 months ago
Visualization of Construction Planning Information
Vig a construction schedule helps planners to identity potential construction problems prior to actual building construction. Planners must envision the sequence of construction, ...
Kathleen McKinney, John C. Kunz, Martin A. Fischer
IUI
1998
ACM
14 years 1 months ago
Software Architecture Critics in Argo
Software architectures are high-level design representations of software systems that focus on composition of software components and how those components interact. Software tures...
Jason E. Robbins, David M. Hilbert, David F. Redmi...
PADS
1998
ACM
14 years 1 months ago
Synchronized Data Distribution Management in Distributed Simulations
A considerable amount of effort in the DIS community has been devoted to developing efficient, scaleable, mechanisms for distributing state updates and interaction information in ...
Ivan Tacic, Richard Fujimoto
CCS
1998
ACM
14 years 1 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik