Sciweavers

3821 search results - page 641 / 765
» A Security Model for Aglets
Sort
View
JISBD
2003
15 years 6 months ago
Advanced Separation of Concerns for Requirements Engineering
Separation of concerns is a fundamental software engineering principle that proposes the encapsulation of each matter of interest in a separate module. Software engineering develop...
Isabel Sofia Brito, Ana M. D. Moreira
SEC
2000
15 years 6 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
15 years 6 months ago
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icart's deterministic enco...
Eric Brier, Jean-Sébastien Coron, Thomas Ic...
136
Voted
CORR
2010
Springer
89views Education» more  CORR 2010»
15 years 5 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 5 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer