Sciweavers

127 search results - page 19 / 26
» Key Management in an Encrypting File System
Sort
View
WOB
2004
103views Bioinformatics» more  WOB 2004»
13 years 10 months ago
An I/O Device Driver for Bioinformatics Tools: the case for BLAST
There are many bioinformatics tools that deal with input/ output (I/O) issues by using filing systems from the most common operating systems, such as Linux or MS Windows. However, ...
Renato Mauro, Sérgio Lifschitz
JAR
2000
145views more  JAR 2000»
13 years 8 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
HICSS
2003
IEEE
214views Biometrics» more  HICSS 2003»
14 years 1 months ago
An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
Dickson K. W. Chiu, Wesley C. W. Chan, Gary K. W. ...
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
ACSAC
2003
IEEE
14 years 1 months ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman