Sciweavers

6164 search results - page 937 / 1233
» Teaching Computer Security
Sort
View
CONEXT
2008
ACM
15 years 6 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar
MKWI
2008
168views Business» more  MKWI 2008»
15 years 6 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
PST
2008
15 years 6 months ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé
SICHERHEIT
2008
15 years 6 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
CIC
2006
114views Communications» more  CIC 2006»
15 years 6 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu