Sciweavers

1834 search results - page 154 / 367
» Public Key Cryptography
Sort
View
139
Voted
IPPS
2008
IEEE
15 years 9 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
132
Voted
ISBI
2004
IEEE
16 years 3 months ago
Software Process: The Key to Developing Robust, Reusable and Maintainable Open-Source Software
The practice of image processing inherently requires software development. Creating this technology requires designing, implementing, debugging and testing software applications o...
Ken Martin, Luis Ibáñez, William J. ...
121
Voted
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 8 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
111
Voted
PST
2004
15 years 4 months ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
117
Voted
TYPES
2004
Springer
15 years 8 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento