Sciweavers

5119 search results - page 180 / 1024
» Security Privacy
Sort
View
MOC
2010
14 years 11 months ago
Midpoint criteria for solving Pell's equation using the nearest square continued fraction
We derive midpoint criteria for solving Pell's equation x2 -Dy2 =
Keith R. Matthews, John P. Robertson, Jim White
ACISP
2011
Springer
14 years 7 months ago
Cryptanalysis of the Compression Function of SIMD
Abstract. SIMD is one of the second round candidates of the SHA3 competition hosted by NIST. In this paper, we present some results
Hongbo Yu, Xiaoyun Wang
CRITIS
2007
15 years 5 months ago
The Structure of the Sense of Security, Anshin
Traditional research on security has been based on the assumption that users would feel secure when provided with secure systems and services. In this research we address factors ...
Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, ...
ESORICS
2004
Springer
15 years 9 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...