Sciweavers

2386 search results - page 269 / 478
» Database Security 2000
Sort
View
114
Voted
IJCNN
2000
IEEE
15 years 7 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
MSS
2000
IEEE
103views Hardware» more  MSS 2000»
15 years 7 months ago
Using Track-Following Servo Technology on LTO Tape Drives
Fall COMDEX was the center of numerous showings of new tape technologies offering significant increases in tape capacity and performance. Of interest to users of midrange tape tec...
Randy Glissman
ASIACRYPT
2000
Springer
15 years 7 months ago
Strengthening McEliece Cryptosystem
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present...
Pierre Loidreau
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...
ECIS
2000
15 years 4 months ago
Organizational, Technological and Regulatory Challenges for Realizing Electronic Government
In this paper we discuss the main challenges faced by electronic government initiatives. First, the components of and the demand for electronic government services are identified. ...
Georg Aichholzer, Rupert Schmutzer