Sciweavers

5722 search results - page 882 / 1145
» Security Function Interactions
Sort
View
HOTNETS
2010
14 years 11 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica
SOSYM
2010
119views more  SOSYM 2010»
14 years 10 months ago
Formal specification of non-functional properties of component-based software systems
Component-based software engineering (CBSE) is viewed as an opportunity to deal with the increasing complexity of modern-day software. Along with CBSE comes the notion of component...
Steffen Zschaler
SPEECH
2010
122views more  SPEECH 2010»
14 years 10 months ago
Similarity and familiarity: Second language sentence recognition in first- and second-language multi-talker babble
The intelligibility of speech in noisy environments depends not only on the functionality of listeners' peripheral auditory systems, but also on cognitive factors such as the...
Kristin J. Van Engen
IACR
2011
252views more  IACR 2011»
14 years 3 months ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
127
Voted
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 11 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...