Sciweavers

6574 search results - page 93 / 1315
» Current Signatures: Application
Sort
View
107
Voted
IACR
2011
136views more  IACR 2011»
14 years 12 days ago
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
We give new methods for generating and using “strong trapdoors” in cryptographic lattices, which are simultaneously simple, efficient, easy to implement (even in parallel), a...
Daniele Micciancio, Chris Peikert
93
Voted
CCS
2006
ACM
15 years 4 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 6 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ACSAC
2000
IEEE
15 years 5 months ago
Enabling Secure On-Line DNS Dynamic Update
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been p...
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine
86
Voted
ICPR
2002
IEEE
16 years 1 months ago
Probabilistic Model-Based Detection of Bent-Double Radio Galaxies
We describe an application of probabilistic modeling to the problem of recognizing radio galaxies with a bentdouble morphology. The type of galaxies in question contain distinctiv...
Sergey Kirshner, Igor V. Cadez, Padhraic Smyth, Ch...