Sciweavers

9316 search results - page 45 / 1864
» Analysis of traceback techniques
Sort
View
ASIACRYPT
2000
Springer
14 years 26 days ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
METRICS
1999
IEEE
14 years 23 days ago
An Investigation of Analysis Techniques for Software Datasets
Lesley Pickard, Barbara Kitchenham, Susan Linkman
RTCSA
1998
IEEE
14 years 23 days ago
A Worst Case Timing Analysis Technique for Optimized Programs
Sung-Soo Lim, Jihong Kim, Sang Lyul Min