Sciweavers

849 search results - page 136 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
WWW
2010
ACM
14 years 5 months ago
The social honeypot project: protecting online communities from spammers
We present the conceptual framework of the Social Honeypot Project for uncovering social spammers who target online communities and initial empirical results from Twitter and MySp...
Kyumin Lee, James Caverlee, Steve Webb
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
14 years 4 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye
DSD
2006
IEEE
183views Hardware» more  DSD 2006»
14 years 4 months ago
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core
The Advanced Encryption Standard (AES) algorithm has become the default choice for various security services in numerous applications. In this paper we present an AES encryption h...
Panu Hämäläinen, Timo Alho, Marko H...
ICICIC
2006
IEEE
14 years 4 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...
SKG
2006
IEEE
14 years 4 months ago
Top Ten Questions To Design A Successful Grid Portal
With the enhancement of Grid application, Grid portal provides a unique interface for end-users to access distributed resources and are used widely in Knowledge Grid, e-Science, e...
Xiao Dong Wang, Xiaobo Yang, Rob Allan