Sciweavers

2139 search results - page 263 / 428
» Distributed computing and computer security education
Sort
View
CORR
2006
Springer
77views Education» more  CORR 2006»
15 years 3 months ago
Prioritizing Software Inspection Results using Static Profiling
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure,...
Cathal Boogerd, Leon Moonen
TIT
2010
160views Education» more  TIT 2010»
14 years 10 months ago
Parameterized splitting systems for the discrete logarithm
Hoffstein and Silverman suggested the use of low Hamming weight product (LHWP) exponents to accelerate group exponentiation while maintaining the security level. With LHWP exponent...
Sungwook Kim, Jung Hee Cheon
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 3 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...
120
Voted
CORR
2002
Springer
74views Education» more  CORR 2002»
15 years 3 months ago
A logical reconstruction of SPKI
SPKI/SDSI is a proposed public key infrastructure standard that incorporates the SDSI public key infrastructure. SDSI's key innovation was the use of local names. We previous...
Joseph Y. Halpern, Ron van der Meyden
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 20 days ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena