Sciweavers

1843 search results - page 135 / 369
» Securing Class Initialization
Sort
View
ISRR
2005
Springer
105views Robotics» more  ISRR 2005»
15 years 10 months ago
Networked Robotic Cameras for Collaborative Observation of Natural Environments
Many viewers simultaneously observe events in a common, but remote, environment in applications ranging from scientific observation, journalism, distance education, security, and...
Dezhen Song, Kenneth Y. Goldberg
164
Voted
ASIACRYPT
1992
Springer
15 years 9 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
ICITS
2009
15 years 2 months ago
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
Abstract. The term indistinguishability amplification refers to a setting where a certain construction combines two (or more) cryptographic primitives of the same type to improve t...
Peter Gazi, Ueli Maurer
ACISP
2008
Springer
15 years 11 months ago
Non-linear Reduced Round Attacks against SHA-2 Hash Family
Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions. Recently, at FSE ’08, ...
Somitra Kumar Sanadhya, Palash Sarkar
APSCC
2007
IEEE
15 years 11 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto