Sciweavers

1106 search results - page 215 / 222
» Automated Design of Security Protocols
Sort
View
SPW
2004
Springer
14 years 3 months ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
BMCBI
2006
130views more  BMCBI 2006»
13 years 10 months ago
Laboratory Information Management Software for genotyping workflows: applications in high throughput crop genotyping
Background: With the advances in DNA sequencer-based technologies, it has become possible to automate several steps of the genotyping process leading to increased throughput. To e...
B. Jayashree, Praveen T. Reddy, Y. Leeladevi, Jona...
POPL
2012
ACM
12 years 5 months ago
A compiler and run-time system for network programming languages
Software-defined networks (SDNs) are a new implementation architecture in which a controller machine manages a distributed collection of switches, by instructing them to install ...
Christopher Monsanto, Nate Foster, Rob Harrison, D...
CASES
2009
ACM
14 years 4 months ago
An accelerator-based wireless sensor network processor in 130nm CMOS
Networks of ultra-low-power nodes capable of sensing, computation, and wireless communication have applications in medicine, science, industrial automation, and security. Over the...
Mark Hempstead, Gu-Yeon Wei, David Brooks
ER
2004
Springer
169views Database» more  ER 2004»
14 years 3 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu