Sciweavers

631 search results - page 95 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ESOP
2006
Springer
15 years 5 months ago
Path Optimization in Programs and Its Application to Debugging
We present and solve a path optimization problem on programs. Given a set of program nodes, called critical nodes, we find a shortest path through the program's control flow g...
Akash Lal, Junghee Lim, Marina Polishchuk, Ben Lib...
EUROCRYPT
2006
Springer
15 years 5 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
CLUSTER
2001
IEEE
15 years 5 months ago
NPACI Rocks: Tools and Techniques for Easily Deploying Manageable Linux Clusters
High-performance computing clusters (commodity hardware with low-latency, high-bandwidth interconnects) based on Linux, are rapidly becoming the dominant computing platform for a ...
Philip M. Papadopoulos, Mason J. Katz, Greg Bruno
CIKM
2000
Springer
15 years 5 months ago
Visual Query and Analysis Tool of the Object-Relational GIS Framework
Geographic Information Systems (GISs) have become an essential tool for efficient handling of our natural and artificial environment. The most important activities in a GIS are qu...
Zoran Stojanovic, Slobodanka Djordjevic-Kajan, Dra...
FC
2000
Springer
127views Cryptology» more  FC 2000»
15 years 5 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung