Sciweavers

14824 search results - page 2645 / 2965
» Security - Introduction
Sort
View
SIGCOMM
2000
ACM
15 years 7 months ago
FIRE: Flexible intra-AS routing environment
Current routing protocols are monolithic, specifying the algorithm used to construct forwarding tables, the metric used by the algorithm (generally some form of hop-count), and th...
Craig Partridge, Alex C. Snoeren, W. Timothy Stray...
120
Voted
SIGECOM
2000
ACM
147views ECommerce» more  SIGECOM 2000»
15 years 7 months ago
MultECommerce: a distributed architecture for collaborative shopping on the WWW
The WWW has made information and services more available than ever before. Many of the first Web applications have been emulations of real world activities, in particular, e-comme...
Stefano Puglia, Robert Carter, Ravi Jain
VRML
2000
ACM
15 years 7 months ago
3D gadgets for business process visualization - a case study
Business visualization is becoming increasingly important, since managers recognize the power of human visual intuition in information-rich decision tasks. Nevertheless, despite i...
Bastiaan Schönhage, Alex van Ballegooij, Anto...
AES
2000
Springer
82views Cryptology» more  AES 2000»
15 years 7 months ago
Fast Implementations of AES Candidates
Of the five AES finalists four—MARS, RC6, Rijndael, Twofish— have not only (expected) good security but also exceptional performance on the PC platforms, especially on those...
Kazumaro Aoki, Helger Lipmaa
ASIACRYPT
2000
Springer
15 years 7 months ago
Trapdooring Discrete Logarithms on Elliptic Curves over Rings
This paper introduces three new probabilistic encryption schemes using elliptic curves over rings. The cryptosystems are based on three specific trapdoor mechanisms allowing the r...
Pascal Paillier
« Prev « First page 2645 / 2965 Last » Next »