Sciweavers

1073 search results - page 168 / 215
» Secure context-sensitive authorization
Sort
View
111
Voted
NETWORK
2008
106views more  NETWORK 2008»
15 years 2 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
130
Voted
IJNSEC
2007
118views more  IJNSEC 2007»
15 years 2 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
110
Voted
CSSE
2004
IEEE
15 years 2 months ago
Specifying multimedia access control using RDF
The Synchronized Multimedia Integration Language (SMIL) [Aya01] is an W3C [W3C03] specification for authoring multimedia documents. Although SMIL has XML like syntactic constructs...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
115
Voted
FPL
2010
Springer
129views Hardware» more  FPL 2010»
15 years 19 days ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
120
Voted
SAFECOMP
2010
Springer
15 years 15 days ago
Experiences in Applying Formal Verification in Robotics
Formal verification efforts in the area of robotics are still comparatively scarce. In this paper we report on our experiences with one such effort, which was concerned with design...
Dennis Walter, Holger Täubig, Christoph L&uum...