Sciweavers

2422 search results - page 456 / 485
» Security Policy Consistency
Sort
View
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 4 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
IACR
2011
112views more  IACR 2011»
13 years 9 months ago
A Domain Transformation for Structure-Preserving Signatures on Group Elements
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for signing group elements in a structure preserving way. A...
Melissa Chase, Markulf Kohlweiss
IACR
2011
252views more  IACR 2011»
13 years 9 months ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
ICDE
2004
IEEE
108views Database» more  ICDE 2004»
15 years 11 months ago
Priority Mechanisms for OLTP and Transactional Web Applications
Transactional workloads are a hallmark of modern OLTP and Web applications, ranging from electronic commerce and banking to online shopping. Often, the database at the core of the...
David T. McWherter, Bianca Schroeder, Anastassia A...
WWW
2004
ACM
15 years 10 months ago
Managing versions of web documents in a transaction-time web server
This paper presents a transaction-time HTTP server, called ? Apache that supports document versioning. A document often consists of a main file formatted in HTML or XML and severa...
Curtis E. Dyreson, Hui-ling Lin, Yingxia Wang