Sciweavers

1818 search results - page 313 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
WPES
2004
ACM
14 years 2 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
INDOCRYPT
2004
Springer
14 years 2 months ago
Exact Analysis of Montgomery Multiplication
The Montgomery multiplication is often used for an efficient implementations of public-key cryptosystems. This algorithm occasionally needs an extra subtraction in the final step,...
Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 2 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
SEMWEB
2004
Springer
14 years 2 months ago
OntoViews - A Tool for Creating Semantic Web Portals
Abstract. This paper presents a semantic web portal tool ONTOVIEWS for publishing RDF content on the web. ONTOVIEWS provides the portal designer with a content-based search engine ...
Eetu Mäkelä, Eero Hyvönen, Samppa S...
SRDS
2003
IEEE
14 years 2 months ago
Assessing the Dependability of OGSA Middleware by Fault Injection
This paper presents our research on devising a dependability assessment method for the upcoming OGSA 3.0 middleware using network level fault injection. We compare existing DCE mi...
Nik Looker, Jie Xu