Sciweavers

488 search results - page 29 / 98
» Policy-Based Cryptography and Applications
Sort
View
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
13 years 11 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
LISA
2001
13 years 8 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
FPL
2010
Springer
168views Hardware» more  FPL 2010»
13 years 5 months ago
Pipelined FPGA Adders
Integer addition is a universal building block, and applications such as quad-precision floating-point or elliptic curve cryptography now demand precisions well beyond 64 bits. Thi...
Florent de Dinechin, Hong Diep Nguyen, Bogdan Pasc...
CSFW
2011
IEEE
12 years 7 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
PDCAT
2004
Springer
14 years 23 days ago
RT-Grid: A QoS Oriented Service Grid Framework
Effective and efficient Quality of Service (QoS) management is critical for a service grid to meet the requirements of both grid users and service providers. We incorporate QoS man...
Hai Jin, Hanhua Chen, Minghu Zhang, Deqing Zou