Sciweavers

5722 search results - page 148 / 1145
» Security Function Interactions
Sort
View
ASIACRYPT
2000
Springer
15 years 5 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
IEICET
2011
14 years 7 months ago
The Security of Abreast-DM in the Ideal Cipher Model
Abstract. In this paper, we give a security proof for Abreast-DM in terms of collision resistance and preimage resistance. As old as Tandem-DM, the compression function Abreast-DM ...
Jooyoung Lee, Daesung Kwon
121
Voted
IAT
2006
IEEE
15 years 6 months ago
Dynamic Service Composition and Selection through an Agent Interaction Protocol
This paper addresses the dynamic service selection and composition issues for the satisfaction of user requirements. We propose an approach in which agents perform service composi...
Yasmine Charif-Djebbar, Nicolas Sabouret
82
Voted
IFL
2004
Springer
15 years 6 months ago
The Feasibility of Interactively Probing Quiescent Properties of GUI Applications
In this paper we explore how application-users can, in an interactive way, test properties about the state of GUI applications that can be classified as local state transition sys...
Peter Achten
87
Voted
AAAI
2008
15 years 3 months ago
Generalized Point Based Value Iteration for Interactive POMDPs
We develop a point based method for solving finitely nested interactive POMDPs approximately. Analogously to point based value iteration (PBVI) in POMDPs, we maintain a set of bel...
Prashant Doshi, Dennis Perez