Sciweavers

2108 search results - page 240 / 422
» Encrypted
Sort
View
JOT
2006
104views more  JOT 2006»
15 years 4 months ago
Call-out Bracket Methods in Timor
This paper extends the concept of qualifying types by describing how their implementations can include not only bracket methods which are applied when a method of a target object ...
James Leslie Keedy, Klaus Espenlaub, Christian Hei...
121
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
15 years 4 months ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...
AMC
2005
188views more  AMC 2005»
15 years 4 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
107
Voted
INFORMATICALT
2007
81views more  INFORMATICALT 2007»
15 years 4 months ago
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem
A generalized group-oriented cryptosystem (GGOC) based on ElGamal cryptosystem was proposed by Yang et al. in 2003. This study shows that if the authorized decryption sets of users...
Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
148
Voted
JUCS
2007
102views more  JUCS 2007»
15 years 4 months ago
The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation
: This article presents an architecture that encrypts data with the AES algorithm. This architecture can be implemented on the Xilinx Virtex II FPGA family, by applying pipelining ...
Oscar Pérez, Yves Berviller, Camel Tanougas...