Sciweavers

1769 search results - page 177 / 354
» Cryptography
Sort
View
117
Voted
IPPS
2005
IEEE
15 years 9 months ago
Bioinformatics on a Heterogeneous Java Distributed System
A programmable Java distributed system, which utilises the free resources of a heterogeneous set of computers linked together by a network, has been developed. The system has been...
Andrew J. Page, Thomas M. Keane, Thomas J. Naughto...
117
Voted
ITCC
2005
IEEE
15 years 9 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis
132
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
ACNS
2005
Springer
81views Cryptology» more  ACNS 2005»
15 years 9 months ago
Searching for High-Value Rare Events with Uncheatable Grid Computing
Abstract. High-value rare-event searching is arguably the most natural application of grid computing, where computational tasks are distributed to a large collection of clients (wh...
Wenliang Du, Michael T. Goodrich
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 9 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern