Sciweavers

1466 search results - page 106 / 294
» Completeness of the Authentication Tests
Sort
View
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
14 years 2 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...
ITICSE
2006
ACM
14 years 2 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
AAAIDEA
2005
IEEE
14 years 1 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ICWE
2003
Springer
14 years 1 months ago
Serverless Web-Multicast Chat System for Multi-users
Abstract. CSCW applications require availability, portability, familiarity, scalability, bandwidth and performance. This paper describes the use of Web-multicasting to address thes...
Md. Asri Ngadi, Bernard S. Doherty