Sciweavers

3938 search results - page 105 / 788
» Interactive Protocols on the Reals
Sort
View
98
Voted
NDSS
1999
IEEE
15 years 5 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu
115
Voted
GI
2000
Springer
15 years 4 months ago
Taming the Tiger: How to Cope with Real Database Products in Transactional Federations for Internet Applications
Data consistency in transactional federations is a key requirement of advanced E-service applications on the Internet, such as electronic auctions or real-estate purchase. Federat...
Ralf Schenkel, Gerhard Weikum
96
Voted
IJCAI
2001
15 years 2 months ago
Reflective Negotiating Agents for Real-Time Multisensor Target Tracking
In this paper we describe a multiagent system in which agents negotiate to allocate resources and satisfy constraints in a real-time environment of multisensor target tracking. Th...
Leen-Kiat Soh, Costas Tsatsoulis
92
Voted
IEICET
2008
113views more  IEICET 2008»
15 years 23 days ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
CRITIS
2009
14 years 10 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...