This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...