Sciweavers

713 search results - page 109 / 143
» Dispersing Hash Functions
Sort
View
WETICE
2005
IEEE
15 years 3 months ago
CAFE - Collaborative Agents for Filtering E-mails
CAFE (Collaborative Agents for Filtering E-mails) is a multi-agent system to collaboratively filter spam from users’ mail stream. CAFE associates a proxy agent with each user, a...
Lorenzo Lazzari, Marco Mari, Agostino Poggi
TRUSTBUS
2005
Springer
15 years 3 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
CHES
2004
Springer
130views Cryptology» more  CHES 2004»
15 years 3 months ago
Switching Blindings with a View Towards IDEA
Cryptographic algorithms implemented on smart-cards must be protected against side-channel attacks. Some encryption schemes and hash functions like IDEA, RC6, MD5, SHA-1 alternate ...
Olaf Neiße, Jürgen Pulkus
IPTPS
2004
Springer
15 years 3 months ago
On the Cost of Participating in a Peer-to-Peer Network
In this paper, we model the cost incurred by each peer participating in a peer-to-peer network. Such a cost model allows to gauge potential disincentives for peers to collaborate,...
Nicolas Christin, John Chuang
MATA
2004
Springer
113views Communications» more  MATA 2004»
15 years 3 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...