Sciweavers

1369 search results - page 52 / 274
» A Practical Implementation of the Timing Attack
Sort
View
86
Voted
CLIMA
2006
15 years 9 days ago
Using Jason to Implement a Team of Gold Miners
This paper describes a team of agents that took part in the second CLIMA Contest. The team was implemented in a logic-based language for BDI agents and was run in a Java-based inte...
Rafael H. Bordini, Jomi Fred Hübner, Daniel M...
83
Voted
ICNP
2007
IEEE
15 years 5 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
94
Voted
CCS
2010
ACM
14 years 11 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
EUROCRYPT
2010
Springer
15 years 3 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
78
Voted
ICPP
2003
IEEE
15 years 4 months ago
Implementation of Strong Mobility for Multi-Threaded Agents in Java
Strong mobility, which allows an external thread to transparently migrate an agent at any time, is difficult to implement in Java since the Java Virtual Machine does not allow se...
Arjav J. Chakravarti, Xiaojin Wang, Jason O. Halls...