Sciweavers

3486 search results - page 629 / 698
» On the Design and Security of RC2
Sort
View
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 3 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
LICS
1999
IEEE
15 years 3 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese
HPCN
1999
Springer
15 years 3 months ago
Towards a Scalable Metacomputing Storage Service
We describe a prototypical storage service through which we are addressing some of the open storage issues in wide-area distributed high-performance computing. We discuss some of t...
Craig J. Patten, Kenneth A. Hawick, J. F. Hercus
ICSE
1999
IEEE-ACM
15 years 3 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
HPDC
1998
IEEE
15 years 3 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman