Sciweavers

1005 search results - page 8 / 201
» Practical Secure Function Evaluation
Sort
View
ICPADS
2007
IEEE
15 years 4 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
15 years 3 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
CG
1998
Springer
15 years 2 months ago
From Simple Features to Sophisticated Evaluation Functions
This paper discusses a practical framework for the semi automatic construction of evaluation functions for games. Based on a structured evaluation function representation, a proced...
Michael Buro
APPINF
2003
14 years 11 months ago
C-QM: A Practical Quality Model for Evaluating COTS Components
A commercial-off-the-shelf (COTS) component is an implementation of common functionality among family members, where an in-house component implements an organization-specific func...
Soo Dong Kim, Ji Hwan Park
AINA
2005
IEEE
15 years 4 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson