Sciweavers

894 search results - page 135 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CRYPTO
2005
Springer
104views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
On the Discrete Logarithm Problem on Algebraic Tori
Abstract. Using a recent idea of Gaudry and exploiting rational representations of algebraic tori, we present an index calculus type algorithm for solving the discrete logarithm pr...
Robert Granger, Frederik Vercauteren
ICCSA
2005
Springer
14 years 2 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
ISW
2005
Springer
14 years 2 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...
HIPC
2004
Springer
14 years 2 months ago
iSAN - An Intelligent Storage Area Network Architecture
This paper describes the motivation, architecture and implementation of iSAN, an “intelligent” storage area network. The main contributions of this work are: (1) how to archite...
Ganesh M. Narayan, K. Gopinath
ISI
2004
Springer
14 years 2 months ago
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
Abstract. Information technologies and infectious disease informatics are playing an increasingly important role in preventing, detecting, and managing infectious disease outbreaks...
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Ca...