Sciweavers

591 search results - page 70 / 119
» Securing the Broker Pattern
Sort
View
CHES
2007
Springer
115views Cryptology» more  CHES 2007»
14 years 2 months ago
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
This papers introduces several binary scalar multiplication algorithms with applications to cryptography. Remarkably, the proposed algorithms regularly repeat the same pattern when...
Marc Joye
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
14 years 2 months ago
Reorganizing Government: Bhutan Visa Online
Centralized government document infrastructure and a policy commitment to transform the tourism sector to a more vivid and efficient business sector works as drivers for implement...
Kim Viborg Andersen, Helle Zinner Henriksen
ASIACRYPT
2000
Springer
14 years 1 months ago
Strengthening McEliece Cryptosystem
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present...
Pierre Loidreau
JIPS
2010
162views more  JIPS 2010»
13 years 3 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
ANCS
2006
ACM
14 years 13 days ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo