Sciweavers

2386 search results - page 215 / 478
» Database Security 2000
Sort
View
JOC
2000
181views more  JOC 2000»
15 years 3 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
ACSAC
2000
IEEE
15 years 7 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
126
Voted
ACSAC
2000
IEEE
15 years 7 months ago
Fair On-line Gambling
This paper proposes a fair electronic gambling scheme for the Internet. The proposed scheme provides a unique link between payment and gambling outcome so that the winner can be e...
Weiliang Zhao, Vijay Varadharajan, Yi Mu
ACISP
2000
Springer
15 years 7 months ago
Two-Stage Optimisation in the Design of Boolean Functions
This paper shows how suitable choice of cost function can significantly affect the power of optimisation methods for the synthesising of Boolean functions. In particular we show ...
John A. Clark, Jeremy Jacob
ACISP
2000
Springer
15 years 7 months ago
An Implementation of Bitsliced DES on the Pentium MMXTM Processor
In this paper we describe an implementation of the DES (and Triple-DES) algorithm using the bitslicing technique on an Intel Pentium MMX processor. Implementation specifics are di...
Lauren May, Lyta Penna, Andrew Clark