Sciweavers

47 search results - page 7 / 10
» pads 2006
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
ICRA
2006
IEEE
86views Robotics» more  ICRA 2006»
15 years 4 months ago
Geckobot: a Gecko Inspired Climbing Robot using Elastomer Adhesives
— In this paper, the design, analysis, and fabrication of a gecko-inspired climbing robot are discussed. The robot has kinematics similar to a gecko’s climbing gait. It uses pe...
Ozgur Unver, Ali Uneri, Alper Aydemir, Metin Sitti
PADS
2006
ACM
15 years 4 months ago
A Framework for Robust HLA-based Distributed Simulations
The High Level Architecture (HLA) is a standard for the interoperability and reuse of simulation components, referred to as federates. Large scale HLA-compliant simulations are bu...
Dan Chen, Stephen John Turner, Wentong Cai
IJON
2007
118views more  IJON 2007»
14 years 10 months ago
Low power CMOS electronic central pattern generator design for a biomimetic underwater robot
— This paper, presents a feasability study of a central pattern generator-based analog controller for an autonomous robot. The operation of a neuronal circuit formed of electroni...
Young-Jun Lee, Jihyun Lee, Kyung Ki Kim, Yong-Bin ...
ESORICS
2006
Springer
15 years 1 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang