Sciweavers

9316 search results - page 45 / 1864
» Analysis of traceback techniques
Sort
View
ASIACRYPT
2000
Springer
15 years 2 months ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
METRICS
1999
IEEE
15 years 2 months ago
An Investigation of Analysis Techniques for Software Datasets
Lesley Pickard, Barbara Kitchenham, Susan Linkman
RTCSA
1998
IEEE
15 years 2 months ago
A Worst Case Timing Analysis Technique for Optimized Programs
Sung-Soo Lim, Jihong Kim, Sang Lyul Min