Sciweavers

68 search results - page 12 / 14
» A New Attack on 6-Round IDEA
Sort
View
AINA
2009
IEEE
14 years 2 months ago
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems
Abstract—The Reliable Server Pooling (RSerPool) architecture is the IETF’s new standard for a lightweight server redundancy and session failover framework to support availabili...
Xing Zhou, Thomas Dreibholz, Fu Fa, Wencai Du, Erw...
NSPW
2003
ACM
14 years 26 days ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 7 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
IACR
2011
120views more  IACR 2011»
12 years 7 months ago
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main t...
David Jao, Luca De Feo
ADMA
2005
Springer
143views Data Mining» more  ADMA 2005»
14 years 1 months ago
A Comprehensive Benchmark of the Artificial Immune Recognition System (AIRS)
: Artificial Immune Systems are a new class of algorithms inspired by how the immune system recognizes, attacks and remembers intruders. This is a fascinating idea, but to be accep...
Lingjun Meng, Peter van der Putten, Haiyang Wang