Sciweavers

1249 search results - page 110 / 250
» Limitations of the Even-Mansour Construction
Sort
View
CSFW
2006
IEEE
15 years 7 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
HICSS
2006
IEEE
130views Biometrics» more  HICSS 2006»
15 years 7 months ago
ERP Acceptance: Organizational Change Perspective
ERP systems acceptance usually involves radical organizational change because it is often associated with fundamental organizational improvements that cut across functional and or...
Kee-Young Kwahk
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach
We propose in this paper a novel content-aware stream-level approach to authenticating multimedia data transmitted over wireless networks. The proposed approach is fundamentally d...
Zhi Li, Yong Lian, Qibin Sun, Chang Chen
ICRA
2006
IEEE
118views Robotics» more  ICRA 2006»
15 years 7 months ago
Symbolic Control for Underactuated Differentially Flat Systems
— In this paper we address the problem of generating input plans to steer complex dynamical systems in an obstaclefree environment. Plans considered admit a finite description l...
Adriano Fagiolini, Luca Greco, Antonio Bicchi, Ben...
SECPERU
2006
IEEE
15 years 7 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza