Sciweavers

5457 search results - page 896 / 1092
» Software Component Independence
Sort
View
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
15 years 8 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata
UML
1997
Springer
15 years 7 months ago
Evaluation of Object-Oriented Modelling Languages: A Comparison Between OML and UML
The following article is motivated by the current efforts of the Object Management Group (OMG) to standardize object-oriented modelling languages. In the face of the great economi...
Michael Prasse
ASIACRYPT
2009
Springer
15 years 7 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
CHI
2009
ACM
15 years 7 months ago
Computer usage in daily life
In this paper we explore the use of computer at home. This work is based on the automatic recording of application focus data in natural situation from a wide representative panel...
Thomas Beauvisage
USENIX
2008
15 years 6 months ago
Free Factories: Unified Infrastructure for Data Intensive Web Services
We introduce the Free Factory, a platform for deploying data-intensive web services using small clusters of commodity hardware and free software. Independently administered virtua...
Alexander Wait Zaranek, Tom Clegg, Ward Vandewege,...