Sciweavers

2157 search results - page 131 / 432
» Optimal Fast Hashing
Sort
View
CISIM
2008
IEEE
15 years 11 months ago
Tuning Struggle Strategy in Genetic Algorithms for Scheduling in Computational Grids
Job Scheduling on Computational Grids is gaining importance due to the need for efficient large-scale Grid-enabled applications. Among different optimization techniques addressed ...
Fatos Xhafa, Bernat Duran, Ajith Abraham, Keshav P...
INFOCOM
2007
IEEE
15 years 11 months ago
On the Stability-Scalability Tradeoff of DHT Deployment
— Distributed hash tables (DHTs) provide efficient data naming and location with simple hash-table-like primitives, upon which sophisticated distributed applications can be buil...
Chih-Chiang Wang, Khaled Harfoush
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
15 years 10 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul
153
Voted
PROVSEC
2007
Springer
15 years 10 months ago
Decryptable Searchable Encryption
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This pa...
Thomas Fuhr, Pascal Paillier
ISW
2005
Springer
15 years 10 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...