Sciweavers

1513 search results - page 1 / 303
» Cryptographic Pattern Matching
Sort
View
ENTCS
2007
96views more  ENTCS 2007»
13 years 4 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...
IFIP
2004
Springer
13 years 10 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
CIARP
2009
Springer
13 years 2 months ago
K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation
In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enr...
H. A. Garcia-Baleon, Vicente Alarcón Aquino...
INFOCOM
2010
IEEE
13 years 3 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
WALCOM
2008
IEEE
95views Algorithms» more  WALCOM 2008»
13 years 6 months ago
Indexing Circular Patterns
This paper deals with the Circular Pattern Matching Problem (CPM). In CPM, we are interested in pattern matching between the text T and the circular pattern C(P) of a given pattern...
Costas S. Iliopoulos, M. Sohel Rahman