Sciweavers

1180 search results - page 153 / 236
» Interaction Protocols in Agentis
Sort
View
FOCS
2007
IEEE
15 years 7 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
95
Voted
OTM
2005
Springer
15 years 6 months ago
Accessing X Applications over the World-Wide Web
Abstract. The X Protocol, an asynchronous network protocol, was developed at MIT amid the need to provide a network transparent graphical user interface primarily for the UNIX Oper...
Arno Puder, Siddharth Desai
99
Voted
CSFW
2003
IEEE
15 years 6 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
101
Voted
DATE
2003
IEEE
106views Hardware» more  DATE 2003»
15 years 6 months ago
Reconfigurable Signal Processing in Wireless Terminals
In this paper, we show the necessity of reconfigurable hardware for data and signal processing in wireless mobile terminals. We first identify the key processing power requirement...
Jürgen Helmschmidt, Eberhard Schüler, Pr...
111
Voted
VRML
2003
ACM
15 years 6 months ago
A multi-user virtual environment system with extensible animations
Multi-user virtual environment (MUVE) systems integrate the technologies of virtual reality and distributed system to allow users to interact with each other in a realistic virtua...
Yi-Lin Liu, Tsai-Yen Li