Sciweavers

1769 search results - page 199 / 354
» Cryptography
Sort
View
130
Voted
ARITH
1997
IEEE
15 years 8 months ago
Theory and applications for a double-base number system
In this paper we present a rigorous theoretical analysis of the main properties of a double base number system, using bases 2 and 3; in particular we emphasize the sparseness of t...
Vassil S. Dimitrov, Graham A. Jullien, William C. ...
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
15 years 8 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
135
Voted
WETICE
1996
IEEE
15 years 8 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
ECUMN
2007
Springer
15 years 7 months ago
Improved User Identity Confidentiality for UMTS Mobile Networks
In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such s...
Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
149
Voted
ANTS
2010
Springer
262views Algorithms» more  ANTS 2010»
15 years 7 months ago
Short Bases of Lattices over Number Fields
Lattices over number elds arise from a variety of sources in algorithmic algebra and more recently cryptography. Similar to the classical case of Z-lattices, the choice of a nice,...
Claus Fieker, Damien Stehlé