Sciweavers

6164 search results - page 891 / 1233
» Teaching Computer Security
Sort
View
WORDS
2005
IEEE
15 years 10 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
IMC
2005
ACM
15 years 10 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
ACISP
2005
Springer
15 years 10 months ago
Group Signature Schemes with Membership Revocation for Large Groups
Group signature schemes with membership revocation have been intensively researched. However, signing and/or verification of some existing schemes have computational costs of O(R)...
Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nob...
AVBPA
2005
Springer
266views Biometrics» more  AVBPA 2005»
15 years 10 months ago
A Hybrid Swipe Fingerprint Mosaicing Scheme
Due to their very small contact areas and low cost, swipe fingerprint sensors provide the very convenient and reliable fingerprint security solutions and are being increasingly u...
Yongliang Zhang, Jie Yang, Hongtao Wu
CHES
2005
Springer
96views Cryptology» more  CHES 2005»
15 years 10 months ago
The "Backend Duplication" Method
Abstract. Several types of logic gates suitable for leakage-proof computations have been put forward [1,2,3,4]. This paper describes a method, called “backend duplication” to a...
Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu,...