Sciweavers

2266 search results - page 283 / 454
» Generalizing parametric timing analysis
Sort
View
111
Voted
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 4 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
105
Voted
AIRWEB
2008
Springer
15 years 2 months ago
Analysing features of Japanese splogs and characteristics of keywords
This paper focuses on analyzing (Japanese) splogs based on various characteristics of keywords contained in them. We estimate the behavior of spammers when creating splogs from ot...
Yuuki Sato, Takehito Utsuro, Yoshiaki Murakami, To...
118
Voted
CCS
2008
ACM
15 years 2 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
104
Voted
CIKM
2008
Springer
15 years 2 months ago
Event gazetteers for navigating humanities resources
In history and the other humanities, events and narrative sequences of events are often of primary interest. Yet while named events sometimes appear as subject headings, systems f...
Ryan Shaw
AVI
2010
15 years 2 months ago
Deep Diffs: visually exploring the history of a document
Software tools are used to compare multiple versions of a textual document to help a reader understand the evolution of that document over time. These tools generally support the ...
Ross Shannon, Aaron J. Quigley, Paddy Nixon