Sciweavers

5722 search results - page 132 / 1145
» Security Function Interactions
Sort
View
CCS
2009
ACM
16 years 1 months ago
Universally composable contributory group key exchange
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by maliciou...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
112
Voted
ACISP
2010
Springer
14 years 10 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
89
Voted
PERCOM
2006
ACM
16 years 8 days ago
Specification of a Functional Architecture for E-Learning Supported by Wireless Technologies
This paper proposes a distributed platform designed to support pervasive learning and interactivity on a university campus and to ease tasks related to learning and teaching. The ...
Philip Grew, Francesco Giudici, Elena Pagani
123
Voted
SFP
2003
15 years 2 months ago
O'Camelot: adding objects to a resource-aware functional language
Abstract: We outline an object-oriented extension to Camelot, a functional language in the ML family designed for resource aware computation. Camelot is compiled for the Java Virtu...
Nicholas Wolverson, Kenneth MacKenzie
PPDP
2009
Springer
15 years 7 months ago
Session types for linear multithreaded functional programming
The construction of reliable concurrent and distributed systems is an extremely difficult endeavour. For complex systems, it requires modular development strategies based on prec...
Vasco Thudichum Vasconcelos