Sciweavers

1255 search results - page 213 / 251
» On Simple and Secure Key Distribution
Sort
View
STOC
2005
ACM
93views Algorithms» more  STOC 2005»
16 years 4 months ago
Representing hard lattices with O(n log n) bits
We present a variant of the Ajtai-Dwork public-key cryptosystem where the size of the public-key is only O(n log n) bits and the encrypted text/clear text ratio is also O(n log n)...
Miklós Ajtai
132
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines
This paper presents the design and implementation of XenSocket, a UNIX-domain-socket-like construct for high-throughput interdomain (VM-to-VM) communication on the same system. The...
Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, J...
NDSS
2006
IEEE
15 years 10 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
ICIAR
2005
Springer
15 years 10 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
131
Voted
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 9 months ago
Blackout Mitigation Assessment in Power Transmission Systems
Electric power transmission systems are a key infrastructure and blackouts of these systems have major direct and indirect consequences on the economy and national security. Analy...
Benjamin A. Carreras, Vickie E. Lynch, David E. Ne...