Sciweavers

83 search results - page 7 / 17
» itcc 2005
Sort
View
ITCC
2005
IEEE
15 years 3 months ago
Byteprints: A Tool to Gather Digital Evidence
In this paper, we present techniques to recover useful information from disk drives that are used to store user data. The main idea is to use a logging mechanism to record the mod...
Sriranjani Sitaraman, Srinivasan Krishnamurthy, Su...
ITCC
2005
IEEE
15 years 3 months ago
An Energy-Efficient Middleware for Supporting Multimedia Services in Mobile Grid Environments
In this paper, we present techniques for exploiting intermittently available resources in grid infrastructures to support QoS-based multimedia applications on mobile devices. Spec...
Yun Huang, Shivajit Mohapatra, Nalini Venkatasubra...
ITCC
2005
IEEE
15 years 3 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
ITCC
2005
IEEE
15 years 3 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis
ITCC
2005
IEEE
15 years 3 months ago
Improved Routing-Based Linear Algebra for the Number Field Sieve
Recently, efficient custom-hardware designs were proposed for the linear algebra step of the Number Field Sieve integer factoring algorithm. These designs make use of a heuristic ...
Willi Geiselmann, Hubert Köpfer, Rainer Stein...