Sciweavers

7839 search results - page 1263 / 1568
» What's there and what's not
Sort
View
IACR
2011
85views more  IACR 2011»
14 years 1 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren
IACR
2011
94views more  IACR 2011»
14 years 1 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 1 months ago
Unveiling the Content-Centric Features of TCP
—Content-centric networking has been proposed as a new networking paradigm that is centered around the distribution of content. A key idea of content-centric networks is to addre...
Suman Srinivasan, Ivica Rimac, Volker Hilt, Moritz...

Publication
127views
14 years 1 months ago
Virtual Open Conversation Spaces: Towards Improved Awareness in a GSE Setting
Conversations between colleagues in collaborative software engineering are important for coordinating work, sharing knowledge and creating knowledge. Overhearing con- versations...
Virtual Open Conversation Spaces: Towards Improved...
CORR
2012
Springer
192views Education» more  CORR 2012»
13 years 9 months ago
Rapid Application Development Using Software Factories
: Software development is still based on manufactory production, and most of the programming code is still hand-crafted. Software development is very far away from the ultimate goa...
Toni Stojanovski, Tomislav Dzekov
« Prev « First page 1263 / 1568 Last » Next »