Sciweavers

235 search results - page 33 / 47
» Generic Pickling and Minimization
Sort
View
ACNS
2007
Springer
94views Cryptology» more  ACNS 2007»
15 years 4 months ago
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
The one-way function tree (OFT) scheme proposed by Balenson et. al is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. ...
Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
71
Voted
ECOWS
2007
Springer
15 years 4 months ago
Towards Optimized Data Fetching for Service Discovery
The advent of Service Oriented Architecture makes services the most flexible, platform-independent choice for exposing and integrating business functionality across a network. Ho...
Maciej Zaremba, Tomas Vitvar, Matthew Moran
ACSAC
2006
IEEE
15 years 4 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
ICDCSW
2005
IEEE
15 years 3 months ago
On Optimal TTL Sequence-Based Route Discovery in MANETs
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...
ICBA
2004
Springer
171views Biometrics» more  ICBA 2004»
15 years 3 months ago
Face Recognition with 3D Model-Based Synthesis
Abstract. Current appearance-based face recognition system encounters the difficulty to recognize faces with appearance variations, while only a small number of training images are...
Xiaoguang Lu, Rein-Lien Hsu, Anil K. Jain, Behrooz...