Sciweavers

1769 search results - page 152 / 354
» Cryptography
Sort
View
141
Voted
JUCS
2007
107views more  JUCS 2007»
15 years 3 months ago
New Advances in Reconfigurable Computing and its Applications
: In this work we present a survey of different papers about reconfigurable computing and its applications. These papers treat very different reconfigurable-computing applications:...
Miguel A. Vega-Rodríguez, Juan Antonio G&oa...
125
Voted
COMCOM
2000
143views more  COMCOM 2000»
15 years 3 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
90
Voted
COMPSEC
2000
117views more  COMPSEC 2000»
15 years 3 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
129
Voted
COMCOM
2002
143views more  COMCOM 2002»
15 years 3 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
113
Voted
INFORMATICALT
2000
123views more  INFORMATICALT 2000»
15 years 3 months ago
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures
Recently, Harn proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weak...
Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang