Sciweavers

5722 search results - page 301 / 1145
» Security Function Interactions
Sort
View
CCS
2008
ACM
15 years 5 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
149
Voted
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
13 years 5 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
VIS
2003
IEEE
169views Visualization» more  VIS 2003»
16 years 4 months ago
Gaussian Transfer Functions for Multi-Field Volume Visualization
Volume rendering is a flexible technique for visualizing dense 3D volumetric datasets. A central element of volume rendering is the conversion between data values and observable q...
Aaron E. Lefohn, Charles D. Hansen, Emil Praun, Jo...
139
Voted
AFP
2004
Springer
15 years 8 months ago
A Functional Shell That Operates on Typed and Compiled Applications
Abstract. Esther is the interactive shell of Famke, a prototype implementation of a strongly typed operating system written in the functional programming language Clean. As usual, ...
Rinus Plasmeijer, Arjen van Weelden
156
Voted
FP
1992
135views Formal Methods» more  FP 1992»
15 years 7 months ago
High Level Specification of I/O in Functional Languages
The interface with the outside world has always been one of the weakest points of functional languages. It is not easy to incorporate I/O without being allowed to do side-effects....
Peter Achten, John H. G. van Groningen, Marinus J....