Sciweavers

5 search results - page 1 / 1
» How to Encipher Messages on a Small Domain
Sort
View
CRYPTO
2009
Springer
101views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
How to Encipher Messages on a Small Domain
Ben Morris, Phillip Rogaway, Till Stegers
ECWEB
2004
Springer
179views ECommerce» more  ECWEB 2004»
13 years 10 months ago
Applying Text Mining on Electronic Messages for Competitive Intelligence
This paper presents how text -mining techniques can be used to analyze an enterprise’s external environment searching for competitors, related products and services, marketing st...
José Palazzo Moreira de Oliveira, Stanley L...
HPCA
1998
IEEE
13 years 9 months ago
Communication Across Fault-Containment Firewalls on the SGI Origin
Scalability and reliability are inseparable in high-performance computing. Fault-isolation through hardware is a popular means of providing reliability. Unfortunately, such isolat...
Kaushik Ghosh, Allan J. Christie
SOCA
2007
IEEE
13 years 11 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
TIT
2010
130views Education» more  TIT 2010»
12 years 12 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar