Sciweavers

2281 search results - page 202 / 457
» Security Patterns and Secure Systems Design
Sort
View
ISJGP
2010
14 years 10 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 6 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
126
Voted
IPPS
2002
IEEE
15 years 5 months ago
Research and Design of a Middleware for Supporting Wide-Area Distributed Applications
As the platform for wide-area distributed applications, the middleware architecture should support adaptability, scalability, mobility, reliability and security. However, current ...
Dong Zhao, Shaowen Yao, Mingtian Zhou
95
Voted
WWW
2004
ACM
16 years 1 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ACISP
2007
Springer
15 years 7 months ago
On Building Hash Functions from Multivariate Quadratic Equations
Recent advances in hash functions cryptanalysis provide a strong impetus to explore new designs. This paper describes a new hash function mq-hash that depends for its security on t...
Olivier Billet, Matthew J. B. Robshaw, Thomas Peyr...