Sciweavers

4511 search results - page 677 / 903
» Observation Based System Security
Sort
View
CORR
2006
Springer
182views Education» more  CORR 2006»
15 years 3 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal
113
Voted
DATESO
2010
150views Database» more  DATESO 2010»
15 years 1 months ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
IEEEHPCS
2010
14 years 10 months ago
Framework of Web content filtering for IPv6
IPv6 embraces various good features from the security perspective, but the improvements also bring us some new challenges for web content filtering. This paper presents a new fram...
Yingxu Lai, Qian Ma, Zhen Yang, Jing Liu
176
Voted
JDCTA
2010
250views more  JDCTA 2010»
14 years 10 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
123
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Routing Fairness in Chord: Analysis and Enhancement
—In Peer-to-Peer (P2P) systems where stored objects are small, routing dominates the cost of publishing and retrieving an object. In such systems, the issue of fairly balancing t...
Rubén Cuevas Rumín, Manuel Urue&ntil...