Sciweavers

6164 search results - page 850 / 1233
» Teaching Computer Security
Sort
View
143
Voted
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
DSOM
2004
Springer
15 years 10 months ago
HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management
Autonomic distributed management enables for deploying self-directed monitoring and control tasks that track dynamic network problems such as performance degradation and security t...
Ehab S. Al-Shaer, Bin Zhang
GCC
2004
Springer
15 years 10 months ago
Applying Grid Technologies to Distributed Data Mining
The Grid promises improvements in the effectiveness with which global businesses are managed, if it enables distributed expertise to be efficiently applied to the analysis of dist...
Alastair C. Hume, Ashley D. Lloyd, Terence M. Sloa...
139
Voted
SSDBM
2002
IEEE
100views Database» more  SSDBM 2002»
15 years 10 months ago
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data
Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contrib...
Josep Domingo-Ferrer, Anna Oganian, Vicenç ...
124
Voted
SACRYPT
2001
Springer
15 years 9 months ago
A Simple Algebraic Representation of Rijndael
We show that there is a very straightforward closed algebraic formula for the Rijndael block cipher. This formula is highly structured and far simpler then algebraic formulations o...
Niels Ferguson, Richard Schroeppel, Doug Whiting