Sciweavers

3616 search results - page 578 / 724
» Conditional Memory Ordering
Sort
View
ARCS
2004
Springer
15 years 6 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
COOPIS
2004
IEEE
15 years 6 months ago
Intellectual Property Rights Management Using a Semantic Web Information System
IPR (Intellectual Property Rights) Management is a complex domain. The IPR field is structured by evolving regulations, practises, business models,... Therefore, DRMS (Digital Righ...
Roberto García, Rosa Gil, Jaime Delgado
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 6 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
CSCLP
2006
Springer
15 years 6 months ago
An Attempt to Dynamically Break Symmetries in the Social Golfers Problem
A number of different satisfaction and optimisation combinatorial problems have recently been approached with constraint programming over the domain of finite sets, for increased d...
Francisco Azevedo
ACSAC
2001
IEEE
15 years 6 months ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu