Sciweavers

977 search results - page 134 / 196
» Soft Constraints for Security
Sort
View
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
15 years 2 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
ACSAC
2000
IEEE
15 years 2 months ago
A Reliable, Scalable General-Purpose Certificate Store
Although there have been various proposals to build large-scale PKIs, there appears to be no research publicly available on the underlying certificate store which will be required...
Peter Gutmann
AGENTS
1998
Springer
15 years 2 months ago
Issues in Temporal Reasoning for Autonomous Control Systems
Deep Space One will be the rst spacecraft to be controlled by an autonomous agent potentially capable of carrying out a complete mission with minimal commandingfrom Earth. The New...
Nicola Muscettola, Paul H. Morris, Barney Pell, Be...
EUROMICRO
1997
IEEE
15 years 2 months ago
A RISC Microprocessor for Contactless Smart Cards
Two years ago [3] we began to study a R.I.S.C. approachfor smart card microprocessors. We reconsider this research to answer the question of the new technology of smart cards: the...
Christian Cormier, Georges Grimonprez
AGENTS
1997
Springer
15 years 2 months ago
Integrating Range and Object Data for Robot Navigation
Most sensors used for robot navigation fall into one of two broad categories: range sensors that give approximate distances to obstacles, and object-based sensors that detect and ...
David Franklin, R. James Firby