Sciweavers

7840 search results - page 159 / 1568
» On generalized Ramsey numbers
Sort
View
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
15 years 6 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
102
Voted
EWSA
2004
Springer
15 years 6 months ago
Experiences Using Viewpoints for Information Systems Architecture: An Industrial Experience Report
There has recently been an increase in interest, among information systems architecture practitioners, in using viewpoints for architectural definition and description. This has be...
Eoin Woods
ASIACRYPT
2000
Springer
15 years 5 months ago
Addition of ElGamal Plaintexts
Abstract. We introduce an efficient method for performing computation on encrypted data, allowing addition of ElGamal encrypted plaintexts. We demonstrate a solution that is robust...
Markus Jakobsson, Ari Juels
85
Voted
EUROCRYPT
1999
Springer
15 years 5 months ago
Lower Bounds for Oblivious Transfer Reductions
We prove the first general and non-trivial lower bound for the number of times a 1-out-of-n Oblivious Transfer of strings of length should be invoked so as to obtain, by an inform...
Yevgeniy Dodis, Silvio Micali
LATIN
2000
Springer
15 years 4 months ago
Approximation Algorithms for Flexible Job Shop Problems
The Flexible Job Shop problem is a generalization of the classical job shop scheduling problem in which for every operation there is a group of machines that can process it. The p...
Klaus Jansen, Monaldo Mastrolilli, Roberto Solis-O...