Sciweavers

930 search results - page 19 / 186
» A Universal Encryption Standard
Sort
View
BPM
2007
Springer
140views Business» more  BPM 2007»
14 years 4 months ago
Adapting Standards to Facilitate the Transition from Situational Model to Reference Model
Reference Models comprise information on best or common practices for reuse. However, they commonly originate from individual projects. Yet, project models are usually situational ...
Christian Janiesch, Armin Stein
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
14 years 2 months ago
Coding Standards Benefiting Product and Service Information in E-commerce
E-Commerce can be streamlined if products and services are unambiguously identified with industryagreed XML tags through the coding of products and services according to standard ...
Alea M. Fairchild, Bruno de Vuyst
SERP
2003
13 years 11 months ago
FAR: An Editing Tool for Standard Information Generation
It’s difficult for administrators to retrieve information from reports that are generated by different people with different computer platforms, word processors, and interpretat...
Tao Zhang, H. Conrad Cunningham, Jian Li
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
13 years 9 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
FOCS
2009
IEEE
14 years 4 months ago
Bit Encryption Is Complete
Abstract— Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, howe...
Steven Myers, Abhi Shelat