Sciweavers

2139 search results - page 266 / 428
» Distributed computing and computer security education
Sort
View
NSPW
2006
ACM
15 years 9 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
CW
2003
IEEE
15 years 8 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
IEEEICCI
2003
IEEE
15 years 8 months ago
Automatic Concept Evolution
An evolutionary algorithm can be used by a distributed group of interacting people to produce the solution to a problem. First the problem must be defined. Each member of the grou...
Terence C. Fogarty
TIT
2010
130views Education» more  TIT 2010»
14 years 10 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
IDTRUST
2009
ACM
15 years 10 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol