Sciweavers

930 search results - page 93 / 186
» A Universal Encryption Standard
Sort
View
SIGUCCS
2003
ACM
14 years 3 months ago
Liberating lab computing: building a stable yet flexible computing environment for students and faculty
Indiana State University has found a way in its 25+ computing facilities to combine the need for a central stable lab image and small support staff with the academic needs of flex...
Kenneth Janz, Pei-Yi Hu
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 2 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
CORR
2006
Springer
146views Education» more  CORR 2006»
13 years 10 months ago
Oblivious-Transfer Amplification
Abstract. Oblivious transfer (OT) is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately...
Jürg Wullschleger
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 1 months ago
SmartInt: Using Mined Attribute Dependencies to Integrate Fragmented Web Databases
Many web databases can be seen as providing partial and overlapping information about entities in the world. To answer queries effectively, we need to integrate the information ab...
Ravi Gummadi, Anupam Khulbe, Aravind Kalavagattu, ...
CORR
2004
Springer
120views Education» more  CORR 2004»
13 years 10 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella