Sciweavers

5123 search results - page 73 / 1025
» Performance and Security Tradeoff
Sort
View
81
Voted
WS
2003
ACM
15 years 3 months ago
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and i...
Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S...
CCS
2006
ACM
15 years 1 months ago
Improving secure server performance by re-balancing SSL/TLS handshakes
Much of today's distributed computing takes place in a client/server model. Despite advances in fault tolerance
Claude Castelluccia, Einar Mykletun, Gene Tsudik
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
15 years 4 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
ACSAC
2001
IEEE
15 years 1 months ago
The Performance Measurement of Cryptographic Primitives on Palm Devices
We developed and evaluated several cryptographic system libraries for Palm OS
Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
97
Voted
EUROCRYPT
1999
Springer
15 years 2 months ago
Software Performance of Universal Hash Functions
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
Wim Nevelsteen, Bart Preneel