Sciweavers

396 search results - page 70 / 80
» Contemporary Block Ciphers
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 4 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
IH
1998
Springer
15 years 4 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 4 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
GLOBECOM
2007
IEEE
15 years 6 months ago
A New Design of Bloom Filter for Packet Inspection Speedup
— Bloom filter is a space-efficient randomized data structure for group membership query. It is widely used in networking applications which involve the packet header/content i...
Yang Chen, Abhishek Kumar, Jun Xu
CBSE
2007
Springer
15 years 6 months ago
Soya: A Programming Model and Runtime Environment for Component Composition Using SSDL
Abstract. The SOAP Service Description Language (SSDL) is a SOAPcentric language for describing Web Service contracts. SSDL focuses on abstraction as the building block for creatin...
Patric Fornasier, Jim Webber, Ian Gorton