Sciweavers

117 search results - page 8 / 24
» A Comparison of Cryptography Courses
Sort
View

Lecture Notes
404views
15 years 5 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
SIGCSE
2002
ACM
134views Education» more  SIGCSE 2002»
13 years 7 months ago
Internationalization of the curriculum report of a project within computer science
In the Fall of 1999 the Center for Excellence in Undergraduate Teaching (CEUT) and the International Office at Virginia Tech provided a small grant to support the incorporation of...
John A. N. Lee
PKC
2007
Springer
125views Cryptology» more  PKC 2007»
14 years 1 months ago
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
Damg˚ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a into the sharings of the bits of a in constant rounds, which is called the bit-decomposit...
Takashi Nishide, Kazuo Ohta
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
14 years 1 months ago
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redund
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emer...
Joseph Tucek, Paul Stanton, Elizabeth Haubert, Rag...
SIGCSE
2003
ACM
141views Education» more  SIGCSE 2003»
14 years 20 days ago
Teaching objects-first in introductory computer science
An objects-first strategy for teaching introductory computer science courses is receiving increased attention from CS educators. In this paper, we discuss the challenge of the obj...
Stephen Cooper, Wanda Dann, Randy Pausch