Sciweavers

115 search results - page 15 / 23
» Broadcast Encryption Using Probabilistic Key Distribution an...
Sort
View
IPPS
2005
IEEE
15 years 3 months ago
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
Jing Lu, John W. Lockwood
CIA
1998
Springer
15 years 2 months ago
Enhancing Mobile Agents with Electronic Commerce Capabilities
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
ICPPW
2003
IEEE
15 years 3 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
CCS
2008
ACM
14 years 11 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
CIBCB
2005
IEEE
15 years 3 months ago
An Internet-based Melanoma Diagnostic System - Toward the Practical Application
— In this paper, we report a practical application of world’s first internet-based melanoma diagnostic system. The system is now available from all over the world, 24 hours 36...
Hitoshi Iyatomi, Hiroshi Oka, Masahiro Hashimoto, ...