Sciweavers

24529 search results - page 258 / 4906
» Computing on Authenticated Data
Sort
View
MMMACNS
2001
Springer
15 years 8 months ago
Dynamic Group Key Management Protocol
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Ghassan Chaddoud, Isabelle Chrisment, André...
132
Voted
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 7 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
151
Voted
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
15 years 7 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
110
Voted
CCR
1999
138views more  CCR 1999»
15 years 3 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
145
Voted
SCIENTOMETRICS
2010
122views more  SCIENTOMETRICS 2010»
15 years 2 months ago
A comparison of bibliometric indicators for computer science scholars and journals on Web of Science and Google Scholar
Abstract. Given the current availability of different bibliometric indicators and of production and citation data sources, the following two questions immediately arise: do the in...
Massimo Franceschet