Sciweavers

658 search results - page 102 / 132
» The Grindahl Hash Functions
Sort
View
ERCIMDL
2007
Springer
164views Education» more  ERCIMDL 2007»
15 years 3 months ago
MinervaDL: An Architecture for Information Retrieval and Filtering in Distributed Digital Libraries
Abstract. We present MinervaDL, a digital library architecture that supports approximate information retrieval and filtering functionality under a single unifying framework. The a...
Christian Zimmer, Christos Tryfonopoulos, Gerhard ...
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
15 years 3 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent
KESAMSTA
2007
Springer
15 years 3 months ago
A Resource Discovery Method Based on Multi-agents in P2P Systems
A peer-to-peer (P2P) system consists of a number of decentralized distributed network nodes that are capable of sharing resources without centralized supervision. Many application...
Yasushi Kambayashi, Yoshikuni Harada
PKC
2007
Springer
160views Cryptology» more  PKC 2007»
15 years 3 months ago
Anonymous Signatures Made Easy
Abstract. At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of...
Marc Fischlin
PROVSEC
2007
Springer
15 years 3 months ago
Decryptable Searchable Encryption
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This pa...
Thomas Fuhr, Pascal Paillier