Sciweavers

3486 search results - page 524 / 698
» On the Design and Security of RC2
Sort
View
RTAS
1996
IEEE
15 years 3 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
FSE
1997
Springer
112views Cryptology» more  FSE 1997»
15 years 3 months ago
A Family of Trapdoor Ciphers
This paper presents several methods to construct trapdoor block ciphers. A trapdoor cipher contains some hidden structure; knowledge of this structure allows an attacker to obtain ...
Vincent Rijmen, Bart Preneel
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 3 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
APLAS
2007
ACM
15 years 3 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
IICS
2010
Springer
15 years 3 months ago
Rearchitecting DNS
Abstract. The Domain Name System (DNS) has been the naming service of the Internet for more than 20 years. It is the foundation of virtually all other distributed service. The deï¬...
Gert Pfeifer, Christof Fetzer, Martin Steuer