Sciweavers

228 search results - page 1 / 46
» Security Function Interactions
Sort
View
ASIACRYPT
2000
Springer
15 years 5 months ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay
NDSS
2000
IEEE
15 years 5 months ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...
AGENTS
2000
Springer
15 years 5 months ago
Varying the user interaction within multi-agent systems
Terry R. Payne, Katia P. Sycara, Michael Lewis
AGENTS
2000
Springer
15 years 5 months ago
Motivation driven learning for interactive synthetic characters
Song-Yee Yoon, Bruce Blumberg, Gerald E. Schneider
ACSAC
2000
IEEE
15 years 5 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten