Sciweavers

20175 search results - page 54 / 4035
» Is abstraction the key to computing
Sort
View
87
Voted
COMPUTER
2008
60views more  COMPUTER 2008»
15 years 19 days ago
Key-Management Infrastructure for Protecting Stored Data
acting the infrastructure of a cryptographic system into three core components.
Luther Martin
AO
2007
80views more  AO 2007»
15 years 20 days ago
Problems in the ontology of computer programs
As a first step in the larger project of charting the ontology of computer programs, we pose three central questions: (1) Can programs, hardware, and metaprograms be organized into...
Amnon H. Eden, Raymond Turner
69
Voted
COMPUTER
2000
65views more  COMPUTER 2000»
15 years 11 days ago
Compression: A Key for Next-Generation Text Retrieval Systems
Nivio Ziviani, Edleno Silva de Moura, Gonzalo Nava...
ICCSA
2005
Springer
15 years 6 months ago
Fault Attack on the DVB Common Scrambling Algorithm
Abstract. The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a strea...
Kai Wirt
60
Voted
DCC
2003
IEEE
16 years 4 days ago
A New NP-Complete Problem and Public-Key Identification
David Pointcheval, Guillaume Poupard