Sciweavers

7434 search results - page 83 / 1487
» Still
Sort
View
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
15 years 10 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 10 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
ADC
2009
Springer
132views Database» more  ADC 2009»
15 years 10 months ago
On Inference of XML Schema with the Knowledge of an Obsolete One
The XML has undoubtedly become a standard for data representation and manipulation. But most of XML documents are still created without the respective description of their structu...
Irena Mlynkova
FROCOS
2009
Springer
15 years 10 months ago
Taming the Complexity of Temporal Epistemic Reasoning
Temporal logic of knowledge is a combination of temporal and epistemic logic that has been shown to be very useful in areas such as distributed systems, security, and multi-agent s...
Clare Dixon, Michael Fisher, Boris Konev
ICWE
2009
Springer
15 years 10 months ago
UWE4JSF: A Model-Driven Generation Approach for Web Applications
Model-driven engineering is a promising approach, but there are still many hurdles to overcome. The tool UWE4JSF solves the hurdles for the model-driven development of web applicat...
Christian Kroiss, Nora Koch, Alexander Knapp