Sciweavers

5665 search results - page 974 / 1133
» Introduction to Computer Security
Sort
View
GCC
2006
Springer
15 years 6 months ago
On Interoperability: The Execution Management Perspective Based on ChinaGrid Support Platform*
Interoperability between different Grid implementations is attracting more and more attention to seamlessly job execution. In this paper, one approach is proposed to implement the...
Yongwei Wu, Likun Liu, Weimin Zheng, Feng He
APCSAC
2001
IEEE
15 years 6 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
IWAN
2000
Springer
15 years 6 months ago
Active Networking Means Evolution (or Enhanced Extensibility Required)
The primary goal of active networking is to increase the pace of network evolution. The approach to achieving this goal, as well as the goal of enhancing customizability, is to al...
Michael W. Hicks, Scott Nettles
118
Voted
FSE
2010
Springer
146views Cryptology» more  FSE 2010»
15 years 5 months ago
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
This paper provides a unified framework for improving PRF (pseudorandom function) advantages of several popular MACs (message authentication codes) based on a blockcipher modeled a...
Mridul Nandi
115
Voted
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 4 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov