Sciweavers

14824 search results - page 2728 / 2965
» Security - Introduction
Sort
View
JCP
2008
87views more  JCP 2008»
15 years 2 months ago
VLSI Architecture of a Cellular Automata based One-Way Function
In this paper, a technique to generate expander graphs using Cellular Automata (CA) has been presented. The special class of CA, known as the Two Predecessor Single Attractor Cellu...
Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy...
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
15 years 2 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
94
Voted
JCS
2008
69views more  JCS 2008»
15 years 2 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
115
Voted
INFSOF
2006
81views more  INFSOF 2006»
15 years 2 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
137
Voted
JDCTA
2008
160views more  JDCTA 2008»
15 years 2 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
« Prev « First page 2728 / 2965 Last » Next »