Sciweavers

107 search results - page 19 / 22
» The Universal Composable Security of Quantum Key Distributio...
Sort
View
94
Voted
HIJ
2008
82views more  HIJ 2008»
14 years 10 months ago
Supporting grid-based clinical trials in Scotland
As clinical trials and medical population studies grow in size and complexity, a computational infrastructure that can underpin such studies is highly desirable. This should addre...
Richard O. Sinnott, A. J. Stell, Oluwafemi Ajayi
77
Voted
CCS
2008
ACM
15 years 8 days ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
88
Voted
SIGSOFT
1996
ACM
15 years 2 months ago
Abstracting Dependencies between Software Configuration Items
ing Dependencies between Software Configuration Items CARL A. GUNTER University of Pennsylvania icle studies an abstract model of dependencies between software configuration items ...
Carl A. Gunter
88
Voted
CCGRID
2006
IEEE
15 years 4 months ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
98
Voted
DIM
2007
ACM
15 years 2 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi