Sciweavers

125
Voted
CCS
2006
ACM
15 years 7 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
142
Voted
CCS
2006
ACM
15 years 7 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
70
Voted
CCS
2006
ACM
15 years 7 months ago
Identity-based registry for secure interdomain routing
E-yong Kim, Klara Nahrstedt, Li Xiao, Kunsoo Park
119
Voted
DSD
2004
IEEE
135views Hardware» more  DSD 2004»
15 years 7 months ago
Long Term Trends for Embedded System Design
An embedded system is an application specific electronic sub-system used in a larger system such as an appliance, an instrument or a vehicle. An embedded system is generally made ...
Ahmed Amine Jerraya
118
Voted
CCS
2006
ACM
15 years 7 months ago
Certified mailing lists
Email List Services (or simply, mailing lists) are becoming increasingly common for collaborative computing. In order to enable their use for official purposes with increased effe...
Himanshu Khurana, Hyung-Seok Hahm