Sciweavers

31 search results - page 7 / 7
» How to Break MD5 and Other Hash Functions
Sort
View
CSFW
2008
IEEE
13 years 11 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang