Sciweavers

488 search results - page 44 / 98
» Policy-Based Cryptography and Applications
Sort
View
ICEB
2004
297views Business» more  ICEB 2004»
15 years 2 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob
118
Voted
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
15 years 6 months ago
Obfuscation for Cryptographic Purposes
Abstract. An obfuscation O of a function F should satisfy two requirements: firstly, using O it should be possible to evaluate F; secondly, O should not reveal anything about F th...
Dennis Hofheinz, John Malone-Lee, Martijn Stam
IPPS
2005
IEEE
15 years 6 months ago
Bioinformatics on a Heterogeneous Java Distributed System
A programmable Java distributed system, which utilises the free resources of a heterogeneous set of computers linked together by a network, has been developed. The system has been...
Andrew J. Page, Thomas M. Keane, Thomas J. Naughto...
146
Voted
CHES
2003
Springer
247views Cryptology» more  CHES 2003»
15 years 5 months ago
Very Compact FPGA Implementation of the AES Algorithm
Abstract. In this paper a compact FPGA architecture for the AES algorithm with 128-bit key targeted for low-cost embedded applications is presented. Encryption, decryption and key ...
Pawel Chodowiec, Kris Gaj
109
Voted
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
15 years 4 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng