Sciweavers

1834 search results - page 260 / 367
» Public Key Cryptography
Sort
View
ECTEL
2007
Springer
14 years 2 months ago
Distilling Lessons from across Different Types of e-learning Interventions
Most Higher Education institutions are now embracing e-learning to some extent. Some have instigated institution-wide e-learning initiatives, whilst others are engaging in the use ...
Grainne Conole
GPC
2007
Springer
14 years 2 months ago
Towards Feasible and Effective Load Sharing in a Heterogeneous Computational Grid
A grid has to provide strong incentive for participating sites to join and stay in it. Participating sites are concerned with the performance improvement brought by the gird for th...
Kuo-Chan Huang, Po-Chi Shih, Yeh-Ching Chung
IMA
2007
Springer
129views Cryptology» more  IMA 2007»
14 years 2 months ago
Toward Acceleration of RSA Using 3D Graphics Hardware
Demand in the consumer market for graphics hardware that accelerates rendering of 3D images has resulted in commodity devices capable of astonishing levels of performance. These re...
Andrew Moss, Dan Page, Nigel P. Smart
KIVS
2007
Springer
14 years 2 months ago
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)
Abstract Most SSL/TLS-based e-commerce applications employ conventional mechanisms for user authentication. These mechanisms—if decoupled from SSL/TLS session establishment—are...
Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo R...
PROVSEC
2007
Springer
14 years 2 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...