Sciweavers

954 search results - page 2 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
CCS
1998
ACM
13 years 10 months ago
Public-Key Cryptography and Password Protocols
Shai Halevi, Hugo Krawczyk
ACSAC
2001
IEEE
13 years 10 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
ECTEL
2006
Springer
13 years 10 months ago
New Media for Teaching Applied Cryptography and Network Security
Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and networ...
Ji Hu, Dirk Cordel, Christoph Meinel
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
13 years 12 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...