Sciweavers

7434 search results - page 83 / 1487
» Still
Sort
View
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
15 years 6 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 6 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
ADC
2009
Springer
132views Database» more  ADC 2009»
15 years 6 months ago
On Inference of XML Schema with the Knowledge of an Obsolete One
The XML has undoubtedly become a standard for data representation and manipulation. But most of XML documents are still created without the respective description of their structu...
Irena Mlynkova
FROCOS
2009
Springer
15 years 6 months ago
Taming the Complexity of Temporal Epistemic Reasoning
Temporal logic of knowledge is a combination of temporal and epistemic logic that has been shown to be very useful in areas such as distributed systems, security, and multi-agent s...
Clare Dixon, Michael Fisher, Boris Konev
ICWE
2009
Springer
15 years 6 months ago
UWE4JSF: A Model-Driven Generation Approach for Web Applications
Model-driven engineering is a promising approach, but there are still many hurdles to overcome. The tool UWE4JSF solves the hurdles for the model-driven development of web applicat...
Christian Kroiss, Nora Koch, Alexander Knapp