Sciweavers

2236 search results - page 284 / 448
» Secure Software Design in Practice
Sort
View
IACR
2011
122views more  IACR 2011»
13 years 9 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
ICDCS
2009
IEEE
15 years 7 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
ICIW
2007
IEEE
15 years 4 months ago
Web Service Composition Approaches: From Industrial Standards to Formal Methods
Abstract— Composition of web services is much studied to support business-to-business and enterprise application integration in e-Commerce. Current web service composition approa...
Maurice H. ter Beek, Antonio Bucchiarone, Stefania...
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
15 years 2 months ago
Persistence and Lurkers in Discussion Lists: A Pilot Study
In email-based discussion lists (DLs), messages resident in archives, email clients and elsewhere are persistent. One way of examining persistent messages is through the eyes of l...
Blair Nonnecke, Jennifer Preece
COOPIS
1998
IEEE
15 years 2 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel