Sciweavers

1834 search results - page 154 / 367
» Public Key Cryptography
Sort
View
IPPS
2008
IEEE
14 years 4 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
ISBI
2004
IEEE
14 years 10 months ago
Software Process: The Key to Developing Robust, Reusable and Maintainable Open-Source Software
The practice of image processing inherently requires software development. Creating this technology requires designing, implementing, debugging and testing software applications o...
Ken Martin, Luis Ibáñez, William J. ...
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
14 years 3 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
PST
2004
13 years 11 months ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
TYPES
2004
Springer
14 years 3 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento