Sciweavers

78 search results - page 1 / 16
» Cryptography on the Internet
Sort
View
FI
2011
96views more  FI 2011»
13 years 8 days ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
CRYPTOLOGIA
2006
67views more  CRYPTOLOGIA 2006»
13 years 5 months ago
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics, and science undergraduates. The competition ...
Joshua Holden, Richard Layton, Laurence D. Merkle,...
OTM
2007
Springer
13 years 11 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page
DSN
2002
IEEE
13 years 10 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz