Sciweavers

3651 search results - page 701 / 731
» Data Mining for Security Applications
Sort
View
84
Voted
NDSS
1998
IEEE
15 years 5 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 5 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
115
Voted
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
15 years 4 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
107
Voted
USS
2008
15 years 3 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
ECLIPSE
2005
ACM
15 years 2 months ago
InsECTJ: a generic instrumentation framework for collecting dynamic information within Eclipse
The heterogeneity and dynamism of today’s software systems make it difficult to assess the performance, correctness, or security of a system outside the actual time and context ...
Arjan Seesing, Alessandro Orso