Sciweavers

125 search results - page 3 / 25
» All Secrets Great and Small
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
13 years 11 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
14 years 6 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
ICDE
2006
IEEE
119views Database» more  ICDE 2006»
14 years 6 months ago
Laws for Rewriting Queries Containing Division Operators
Relational division, also known as small divide, is a derived operator of the relational algebra that realizes a many-to-one set containment test, where a set is represented as a ...
Ralf Rantzau, Christoph Mangold
BMCBI
2010
208views more  BMCBI 2010»
13 years 5 months ago
Calculation of accurate small angle X-ray scattering curves from coarse-grained protein models
Background: Genome sequencing projects have expanded the gap between the amount of known protein sequences and structures. The limitations of current high resolution structure det...
Kasper Stovgaard, Christian Andreetta, Jesper Ferk...
RFIDSEC
2010
13 years 3 months ago
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...
Julio César Hernández Castro, Pedro ...