Sciweavers

631 search results - page 55 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
MA
2000
Springer
135views Communications» more  MA 2000»
15 years 5 months ago
Principles of Mobile Maude
Mobile Maude is a mobile agent language extending the rewriting logic language Maude and supporting mobile computation. Mobile Maude uses reflection to obtain a simple and general ...
Francisco Durán, Steven Eker, Patrick Linco...
122
Voted
AUSFORENSICS
2004
15 years 3 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
WSC
2004
15 years 3 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
110
Voted
CORR
2008
Springer
138views Education» more  CORR 2008»
15 years 1 months ago
An Improved Robust Fuzzy Extractor
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W to agree on a secret key R in the presence of an active ...
Bhavana Kanukurthi, Leonid Reyzin
TIFS
2008
137views more  TIFS 2008»
15 years 1 months ago
Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform
This paper presents a hierarchical watermarking framework for semiregular meshes. Three blind watermarks are inserted in a semiregular mesh with different purposes: a geometrically...
Kai Wang, Guillaume Lavoué, Florence Denis,...