Sciweavers

5722 search results - page 491 / 1145
» Security Function Interactions
Sort
View
CRYPTO
2001
Springer
145views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Pseudorandomness from Braid Groups
Recently the braid groups were introduced as a new source for cryptography. The group operations are performed efficiently and the features are quite different from those of other...
Eonkyung Lee, Sangjin Lee, Sang Geun Hahn
AGENTS
2000
Springer
15 years 9 months ago
Scalability Metrics and Analysis of Mobile Agent Systems
Scalability is a many-sided property which can be captured in a scalability metric that balances cost, volume, timeliness and other attirbutes of value in the system, as a functio...
C. Murray Woodside
CCS
2000
ACM
15 years 9 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
ACSAC
1999
IEEE
15 years 9 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
AGENTS
1997
Springer
15 years 9 months ago
Yenta: A Multi-Agent, Referral-Based Matchmaking System
Many important and useful applications for software agents require multiple agents on a network that communicate with each other. Such agents must find each other and perform a u...
Leonard N. Foner