Sciweavers

630 search results - page 20 / 126
» The Future Is Not Assured - But It Should Be
Sort
View
EUROPKI
2007
Springer
15 years 5 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
NDSS
2006
IEEE
15 years 7 months ago
Deploying a New Hash Algorithm
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
Steven M. Bellovin, Eric Rescorla
DATE
2002
IEEE
115views Hardware» more  DATE 2002»
15 years 6 months ago
Design Technology for Networked Reconfigurable FPGA Platforms
Future networked appliances should be able to download new services or upgrades from the network and execute them locally. This flexibility is typically achieved by processors tha...
Steve Guccione, Diederik Verkest, Ivo Bolsens
SIGCSE
2008
ACM
116views Education» more  SIGCSE 2008»
15 years 1 months ago
Evaluating a breadth-first cs 1 for scientists
This paper presents a thorough evaluation of CS for Scientists, a CS 1 course designed to provide future scientists with an overview of the discipline. The course takes a breadth-...
Zachary Dodds, Ran Libeskind-Hadas, Christine Alva...
87
Voted
AUTONOMICS
2007
ACM
15 years 5 months ago
Featuring trust and reputation management systems for constrained hardware devices
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the ...
Rodrigo Roman, M. Carmen Fernández Gago, Ja...