Sciweavers

158 search results - page 21 / 32
» Data Encryption Standard (DES)
Sort
View
SPW
2004
Springer
14 years 26 days ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
PVLDB
2010
117views more  PVLDB 2010»
13 years 6 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
GI
2005
Springer
14 years 1 months ago
Integration von ISO- und agroXML in GML
: In diesem Beitrag wird die Integration von ISO11783-XML Task Data (ISO-XML) und agroXML in GML (Geography Markup Language) für den Austausch von raumbezogenen Daten in der Landw...
Peter Korduan, Edward Nash
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen
IJNSEC
2008
164views more  IJNSEC 2008»
13 years 7 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau