Sciweavers

7434 search results - page 110 / 1487
» Still
Sort
View
CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
15 years 8 months ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin
TOOLS
1992
IEEE
15 years 8 months ago
The Oberon System
We show how an object-oriented system-and in particular the Oberon System-can be used to write software that is extensible by end users even while the software is running. Extensib...
Hanspeter Mössenböck
EUROCRYPT
1990
Springer
15 years 8 months ago
A Known Plaintext Attack on Two-Key Triple Encryption
A chosen-plaintext attack on two-key triple encryption noted by Merkle and Hellman is extended to a known-plaintext attack. The known-plaintext attack has lower memory requirements...
Paul C. van Oorschot, Michael J. Wiener
ACSAC
2007
IEEE
15 years 8 months ago
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection
This paper provides a general and comprehensive approach to implementing misuse detection on expert systems and an in-depth analysis of the effectiveness of the optimization strat...
Michael Meier, Ulrich Flegel, Sebastian Schmerl
AOSE
2007
Springer
15 years 8 months ago
Generation of Repair Plans for Change Propagation
Abstract. One of the most critical problems in software maintenance and evolution is propagating changes. Although many approaches have been proposed, automated change propagation ...
Khanh Hoa Dam, Michael Winikoff