Sciweavers

2409 search results - page 305 / 482
» Building Components from Functions
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
88
Voted
ICDCS
2002
IEEE
15 years 3 months ago
Process Migration: A Generalized Approach Using a Virtualizing Operating System
Process migration has been used to perform specialized tasks, such as load sharing and checkpoint/restarting long running applications. Implementation typically consists of modifi...
Tom Boyd, Partha Dasgupta
KESAMSTA
2010
Springer
15 years 3 months ago
Symmetry Approach to Evacuation Scenarios
The first trial of using the symmetry analysis method in modeling of behavior of complex social system is presented in this work. The evacuation of large building scenarios are d...
Wieslawa Sikora, Janusz Malinowski
82
Voted
ACISP
2009
Springer
15 years 2 months ago
Efficiency Bounds for Adversary Constructions in Black-Box Reductions
Abstract. We establish a framework for bounding the efficiency of cryptographic reductions in terms of their security transfer. While efficiency bounds for the reductions have been...
Ahto Buldas, Aivo Jürgenson, Margus Niitsoo
75
Voted
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
15 years 1 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar