Sciweavers

5722 search results - page 533 / 1145
» Security Function Interactions
Sort
View
170
Voted
FSE
2004
Springer
167views Cryptology» more  FSE 2004»
15 years 10 months ago
Nonce-Based Symmetric Encryption
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function E of the message M and the key K: the user su...
Phillip Rogaway
WISEC
2010
ACM
15 years 10 months ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
117
Voted
ACSAC
2003
IEEE
15 years 10 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
AGENTS
2000
Springer
15 years 9 months ago
Capability-based agent matchmaking
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
OOPSLA
1999
Springer
15 years 9 months ago
Practical Experience with an Application Extractor for Java
Java programs are routinely transmitted over low-bandwidth network connections as compressed class le archives (i.e., zip les and jar les). Since archive size is directly proporti...
Frank Tip, Chris Laffra, Peter F. Sweeney, David S...