Sciweavers

1286 search results - page 158 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
94
Voted
SI3D
2003
ACM
15 years 6 months ago
Budget sampling of parametric surface patches
We investigate choosing point samples on a model comprising parametric patches to meet a user specified budget. These samples may then be triangulated, rendered as points or ray-...
Jatin Chhugani, Subodh Kumar
DCC
2005
IEEE
16 years 8 days ago
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Elliptic curve cryptosystems in the presence of faults were studied by Biehl, Meyer and M?uller (2000). The first fault model they consider requires that the input point P in the c...
Mathieu Ciet, Marc Joye
87
Voted
IEEESCC
2005
IEEE
15 years 6 months ago
Knowledge as a Service and Knowledge Breaching
In this paper, we introduce and explore a new computing paradigm we call knowledge as a service, in which a knowledge service provider, via its knowledge server, answers queries p...
Shouhuai Xu, Weining Zhang
98
Voted
CCS
2008
ACM
15 years 2 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
116
Voted
DEBS
2008
ACM
15 years 1 months ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur