Sciweavers

1183 search results - page 169 / 237
» On flow-sensitive security types
Sort
View
NPC
2004
Springer
15 years 9 months ago
Paramecium: Assembling Raw Nodes into Composite Cells
In conventional DHTs, each node is assigned an exclusive slice of identifier space. Simple it is, such arrangement may be rough. In this paper we propose a generic component struc...
Ming Chen, Guangwen Yang, Yongwei Wu, Xuezheng Liu
IPPS
2003
IEEE
15 years 9 months ago
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array
This paper describes a hardware architecture for modular multiplication operation which is efficient for bit-lengths suitable for both commonly used types of Public Key Cryptogra...
Siddika Berna Örs, Lejla Batina, Bart Preneel...
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 9 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
FSTTCS
2003
Springer
15 years 9 months ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
EDOC
2000
IEEE
15 years 8 months ago
Pay As You Go-Associating Costs with Jini Leases
Jini is a technology for building reliable, fault-tolerant distributed applications. Besides offering an infrastructure for clients to locate services, it introduces the concept o...
Peer Hasselmeyer, Markus Schumacher, Marco Vo&szli...