Sciweavers

4511 search results - page 675 / 903
» Observation Based System Security
Sort
View
ICSM
2003
IEEE
15 years 9 months ago
Critical Success Factors in Software Maintenance-A Case Study
: The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance pr...
Harry M. Sneed, Peter Brössler
IPPS
2003
IEEE
15 years 9 months ago
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array
This paper describes a hardware architecture for modular multiplication operation which is efficient for bit-lengths suitable for both commonly used types of Public Key Cryptogra...
Siddika Berna Örs, Lejla Batina, Bart Preneel...
114
Voted
PQCRYPTO
2010
187views Cryptology» more  PQCRYPTO 2010»
15 years 7 months ago
Information-Set Decoding for Linear Codes over Fq
The best known non-structural attacks against code-based cryptosystems are based on information-set decoding. Stern’s algorithm and its improvements are well optimized and the co...
Christiane Peters
118
Voted
ICCS
2007
Springer
15 years 7 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...
144
Voted
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 7 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman