Sciweavers

631 search results - page 64 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
WSS
2001
110views Control Systems» more  WSS 2001»
15 years 3 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
ACL
1997
15 years 3 months ago
An Algorithm for Generating Referential Descriptions with Flexible Interfaces
Most algorithms dedicated to the generation of referential descriptions widely suffer from a fundamental problem: they make too strong assumptions about adjacent processing compon...
Helmut Horacek
97
Voted
BC
2006
82views more  BC 2006»
15 years 1 months ago
Experiments and models of sensorimotor interactions during locomotion
During locomotion sensory information from cutaneous and muscle receptors is continuously integrated with the locomotor central pattern generator (CPG) to generate an appropriate m...
Alain Frigon, Serge Rossignol
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
15 years 1 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 1 months ago
Dynamic Logic of Common Knowledge in a Proof Assistant
Common knowledge logic is meant to describe situations of the real world where a group of agents is involved. These agents share knowledge and make strong hypotheses on the knowled...
Pierre Lescanne, Jérôme Puissé...