Sciweavers

488 search results - page 57 / 98
» Policy-Based Cryptography and Applications
Sort
View
107
Voted
WETICE
1996
IEEE
15 years 4 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
120
Voted
ANTS
2010
Springer
262views Algorithms» more  ANTS 2010»
15 years 4 months ago
Short Bases of Lattices over Number Fields
Lattices over number elds arise from a variety of sources in algorithmic algebra and more recently cryptography. Similar to the classical case of Z-lattices, the choice of a nice,...
Claus Fieker, Damien Stehlé
108
Voted
ANTS
2010
Springer
250views Algorithms» more  ANTS 2010»
15 years 4 months ago
A Subexponential Algorithm for Evaluating Large Degree Isogenies
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between ellip...
David Jao, Vladimir Soukharev
129
Voted
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
15 years 4 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
81
Voted
ANTS
2006
Springer
94views Algorithms» more  ANTS 2006»
15 years 4 months ago
Fast Bounds on the Distribution of Smooth Numbers
Let P(n) denote the largest prime divisor of n, and let (x, y) be the number of integers n x with P(n) y. In this paper we present improvements to Bernstein's algorithm, whi...
Scott T. Parsell, Jonathan Sorenson