Sciweavers

1663 search results - page 201 / 333
» Computer Security in the Real World
Sort
View
150
Voted
CORR
2004
Springer
142views Education» more  CORR 2004»
15 years 4 months ago
Global Grids and Software Toolkits: A Study of Four Grid Middleware Technologies
: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizati...
Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, D...
152
Voted
DLOG
2003
15 years 5 months ago
Conceptual Modeling with Description Logics
The purpose of the chapter is to help someone familiar with DLs to understand the issues involved in developing an ontology for some universe of discourse, which is to become a co...
Alexander Borgida, Ronald J. Brachman
DCC
2001
IEEE
16 years 3 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
DSN
2007
IEEE
15 years 10 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
MIDDLEWARE
2004
Springer
15 years 9 months ago
A Content Model for Evaluating Peer-to-Peer Searching Techniques
Simulation studies are frequently used to evaluate new peer-to-peer searching techniques as well as existing techniques on new applications. Unless these studies are accurate in th...
Brian F. Cooper