Sciweavers

1005 search results - page 105 / 201
» Practical Secure Function Evaluation
Sort
View
89
Voted
AGENTS
2000
Springer
15 years 5 months ago
Capability-based agent matchmaking
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
134
Voted
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
123
Voted
TMI
2010
155views more  TMI 2010»
14 years 7 months ago
3D Forward and Back-Projection for X-Ray CT Using Separable Footprints
The greatest impediment to practical adoption of iterative methods for X-ray CT is the computation burden of cone-beam forward and back-projectors. Moreover, forward and back-proje...
Yong Long, Jeffrey A. Fessler, James M. Balter
INFOCOM
2000
IEEE
15 years 4 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
90
Voted
IACR
2011
182views more  IACR 2011»
14 years 9 days ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi