Sciweavers

2108 search results - page 346 / 422
» Encrypted
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 3 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
TRUST
2010
Springer
14 years 3 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
DSN
2002
IEEE
14 years 3 months ago
Detection of Invalid Routing Announcement in the Internet
Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...
FCCM
2002
IEEE
174views VLSI» more  FCCM 2002»
14 years 3 months ago
PAM-Blox II: Design and Evaluation of C++ Module Generation for Computing with FPGAs
This paper explores the implications of integrating flexible module generation into a compiler for FPGAs. The objective is to improve the programmabilityof FPGAs, or in other wor...
Oskar Mencer
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 3 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...