Sciweavers

400 search results - page 3 / 80
» Cryptography and computer security for undergraduates
Sort
View
30
Voted
TJS
2011
29views more  TJS 2011»
14 years 8 months ago
Secure mobile communication via identity-based cryptography and server-aided computations
Matthew Smith, Christian Schridde, Björn Agel...
SIGCSE
2006
ACM
131views Education» more  SIGCSE 2006»
15 years 7 months ago
An undergraduate course on software bug detection tools and techniques
The importance of software bug detection tools is high with the constant threat of malicious activity. Companies are increasingly relying on software bug detection tools to catch ...
Eric Larson
ESCIENCE
2005
IEEE
15 years 7 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
FCS
2006
15 years 2 months ago
Polynomially Uncomputable Number-Theoretic Problems in Cryptography and Network Security
By far the most important automated tool for network and communications security is encryption, but encryption itself needs security. As we know, many cryptosystems and cryptograp...
Song Y. Yan, Glyn James, Gongyi Wu
IACR
2011
128views more  IACR 2011»
14 years 1 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang