Sciweavers

1875 search results - page 280 / 375
» Modeling the Security of Steganographic Systems
Sort
View
EURODAC
1994
IEEE
124views VHDL» more  EURODAC 1994»
15 years 4 months ago
Automotive databus simulation using VHDL
developed and standardised, for example CAN[1][2], J1850[3]. THE ELECTRONIC VEHICLE TODAYVHDL has been used to develop a simulator for automotive databus networks. This is a design...
Karen Hale
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 2 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
97
Voted
PST
2004
15 years 1 months ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
106
Voted
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 15 days ago
MapReduce for Integer Factorization
Abstract. Integer factorization is a very hard computational problem. Currently no ecient algorithm for integer factorization is publicly known. However, this is an important probl...
Javier Tordable
CORR
2008
Springer
96views Education» more  CORR 2008»
15 years 14 days ago
On the Superdistribution of Digital Goods
: Business models involving buyers of digital goods in the distribution process are called superdistribution schemes. We review the state-of-the art of research and application of ...
Andreas U. Schmidt