Sciweavers

5722 search results - page 351 / 1145
» Security Function Interactions
Sort
View
186
Voted
ATAL
2006
Springer
15 years 5 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
169
Voted
CSFW
2012
IEEE
13 years 6 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
129
Voted
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 7 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
117
Voted
EUROCRYPT
2010
Springer
15 years 7 months ago
Stam's Collision Resistance Conjecture
At CRYPTO 2008 Stam [7] made the following conjecture: if an m + s-bit to s-bit compression function F makes r calls to a primitive f of n-bit input, then a collision for F can be ...
John P. Steinberger
115
Voted
ACMACE
2007
ACM
15 years 7 months ago
Tangible comics: a performance space with full-body interaction
Tangible Comics is a computer vision based full-body interactive storytelling environment that also functions as a comics generator. Prevailing applications of full-body computer ...
Özge Samanci, Yanfeng Chen, Ali Mazalek