Sciweavers

14824 search results - page 2652 / 2965
» Security - Introduction
Sort
View
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 7 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
IDMS
1997
Springer
97views Multimedia» more  IDMS 1997»
15 years 7 months ago
A Soft Real Time Scheduling Server in UNIX Operating System
We present a soft real-time CPU server for Continuous Media processing in the UNIX environment. The server is a daemon process from which applications can request and acquire soft...
Hao-Hua Chu, Klara Nahrstedt
MA
1997
Springer
149views Communications» more  MA 1997»
15 years 7 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
CRYPTO
1992
Springer
181views Cryptology» more  CRYPTO 1992»
15 years 7 months ago
Fair Public-Key Cryptosystems
Abstract Joseph Kilian NEC Research Princeton, NJ 08540 Tom Leighton Mathematics Department Laboratory for Computer Science MIT Cambridge, MA 02139 August 17, 1994 Fair" Publ...
Silvio Micali
MM
1994
ACM
151views Multimedia» more  MM 1994»
15 years 7 months ago
Distributed Parallel Data Storage Systems: A Scalable Approach to High Speed Image Servers
We have designed, built, and analyzed a distributed parallel storage system that will supply image streams fast enough to permit multi-user, "real-time", video-like appl...
Brian Tierney, Jason Lee, Ling Tony Chen, Hanan He...
« Prev « First page 2652 / 2965 Last » Next »