Sciweavers

TCOS
2010
12 years 11 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
TCOS
2010
12 years 11 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
TCOS
2010
12 years 11 months ago
GPU Accelerated Cryptography as an OS Service
Owen Harrison, John Waldron
STTT
2010
194views more  STTT 2010»
12 years 11 months ago
Data-abstraction refinement: a game semantic approach
traction Refinement: A Game Semantic Approach Adam Bakewell2 , Aleksandar Dimovski1 , Dan R. Ghica2 , Ranko Lazi
Adam Bakewell, Aleksandar Dimovski, Dan R. Ghica, ...

0
posts
with
0
views
232profile views
nnduc32Student
nnduc32
FCSC
2010
170views more  FCSC 2010»
13 years 1 months ago
Formal verification of concurrent programs with read-write locks
Abstract Read-write locking is an important mechanism to improve concurrent granularity, but it is difficult to reason about the safety of concurrent programs with read-write locks...
Ming Fu, Yu Zhang, Yong Li
FCSC
2010
238views more  FCSC 2010»
13 years 1 months ago
Knowledge discovery through directed probabilistic topic models: a survey
Graphical models have become the basic framework for topic based probabilistic modeling. Especially models with latent variables have proved to be effective in capturing hidden str...
Ali Daud, Juanzi Li, Lizhu Zhou, Faqir Muhammad

0
posts
with
0
views
226profile views
2jhonroyTeacher
2jhonroy
FCS
2009
13 years 2 months ago
Circuits as a Classifier for Small-World Network Models
The number and length distribution of circuits or loops in a graph or network give important insights into its key characteristics. We discuss the circuit properties of various sm...
Arno Leist, Kenneth A. Hawick
FCS
2009
13 years 2 months ago
Spectral Analysis of Attractors in Random Boolean Network Models
Circuits and loops in graph systems can be used to model the attractors in gene-regulatory networks. The number of such attractors grows very rapidly with network size and even fo...
Kenneth A. Hawick