Sciweavers

5722 search results - page 363 / 1145
» Security Function Interactions
Sort
View
120
Voted
ISI
2004
Springer
15 years 9 months ago
Discovering Hidden Groups in Communication Networks
We describe models and efficient algorithms for detecting groups (communities) functioning in communication networks which attempt to hide their functionality – hidden groups. O...
Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ism...
125
Voted
DATE
2005
IEEE
141views Hardware» more  DATE 2005»
15 years 5 months ago
Multimedia Applications of Multiprocessor Systems-on-Chips
This paper surveys the characteristics of multimedia systems. Multimedia applications today are dominated by compression and decompression, but multimedia devices must also implem...
Wayne Wolf
107
Voted
VIZSEC
2005
Springer
15 years 9 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
TCC
2010
Springer
169views Cryptology» more  TCC 2010»
16 years 20 days ago
On Complete Primitives for Fairness
Abstract. For secure two-party and multi-party computation with abort, classification of which primitives are complete has been extensively studied in the literature. However, for...
S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostr...
138
Voted
CCS
2005
ACM
15 years 9 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin