Sciweavers

2392 search results - page 282 / 479
» informs 2000
Sort
View
SACRYPT
1998
Springer
111views Cryptology» more  SACRYPT 1998»
15 years 9 months ago
Storage-Efficient Finite Field Basis Conversion
Abstract. This contribution proposes text for possible inclusion in IEEE P1363a specifying storageefficient finite field basis conversion techniques. Like IEEE P1363a, it is writte...
Burton S. Kaliski Jr., Yiqun Lisa Yin
ACSAC
2000
IEEE
15 years 8 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
AGENTS
2000
Springer
15 years 8 months ago
A game-theoretic formulation of multi-agent resource allocation
This paper considers resource allocation in a network with mobile agents competing for computational priority. We formulate this problem as a multi-agent game with the players bei...
Jonathan Bredin, Rajiv T. Maheswaran, Çagri...
ASIACRYPT
2000
Springer
15 years 8 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 8 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...