The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collaborative design is one of core processes for networked manufacturing, so how to safely transfer design information in the network has important significance. In order to provide the confidentiality of transmission information on the level of design team in collaborative design system, a new broadcast encryption scheme based on designerpsilas identity is presented. The new scheme is based on broadcast...
The development of tools for automated analysis of data collected for mine countermeasures (MCM) search, classify and map (SCM) has predominantly focused on automated target recognition for individual mines. As MCM target detection becomes more automated, detecting spatial patterns in the positioning of mines should follow. Natural restrictions on mine deployment such as depth and bottom contour as...
RC4 is one of the most widely used stream cipher. It is fairly simple and efficient, and is used, among other things, in WEP, TKIP and SSL/TLS protocols. Fluhrer, Mantin and Shamir show that RC4 is completely insecure in the WEP mode of operation, and most of the discovered weaknesses are related to the key-scheduling algorithm (KSA) part of RC4. Crainicu and Boian propose a new variant of key-scheduling...
We define the class of trapdoor pseudo-random number generators, and introduce a new technique for using these in cryptography. As an application for this technique, we present a provably secure protocol for One-Bit Disclosures i.e. for giving a one-bit message in exchange for receipt.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.