Sciweavers

3486 search results - page 531 / 698
» On the Design and Security of RC2
Sort
View
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 11 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
JCP
2007
159views more  JCP 2007»
14 years 11 months ago
Authoring of Units of Learning via Dialogue Systems
— Detailed and expressive e-learning specifications like IMS LD [1] are necessary to create efficient e-learning applications. E-learning specifications that meet these demand...
Dietmar Janetzko
ECRA
2002
180views more  ECRA 2002»
14 years 11 months ago
vCOM: Electronic commerce in a collaborative virtual world
Existing e-commerce applications on the web provide the users a relatively simple, browser-based interface to access available products. Customers are not provided with the same s...
Xiaojun Shen, T. Radakrishnan, Nicolas D. Georgana...
RSA
2000
170views more  RSA 2000»
14 years 11 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
COMCOM
2008
135views more  COMCOM 2008»
14 years 11 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan