Sciweavers

3486 search results - page 70 / 698
» On the Design and Security of RC2
Sort
View
85
Voted
IJNSEC
2008
98views more  IJNSEC 2008»
14 years 11 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 3 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
AGENTS
2000
Springer
15 years 3 months ago
Verbal communication: using approximate sound propagation to design an inter-agents communication language
In this paper, we will present a method for generating conversations between human-like agents by proposing specific parameters for inter-agents messages with an approximation of...
Jean-Sébastien Monzani, Daniel Thalmann
APSEC
2006
IEEE
15 years 5 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
15 years 4 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt