Sciweavers

5843 search results - page 44 / 1169
» Software Security in Practice
Sort
View
EUROCRYPT
2006
Springer
13 years 11 months ago
Practical Identity-Based Encryption Without Random Oracles
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems
Craig Gentry
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 2 months ago
Data Preservation in High Energy Physics - why, how and when?
Long-term preservation of data and software of large experiments and detectors in high energy physics is of utmost importance to secure the heritage of (mostly unique) data and to...
Siegfried Bethke
EUROCRYPT
2006
Springer
13 years 11 months ago
QUAD: A Practical Stream Cipher with Provable Security
We introduce a practical synchronous stream cipher with provable security named QUAD. The cipher relies on the iteration of a multivariate quadratic system of m equations in n <...
Côme Berbain, Henri Gilbert, Jacques Patarin
ISF
2006
118views more  ISF 2006»
13 years 7 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
OOPSLA
1992
Springer
13 years 11 months ago
Case Study of Object-Oriented Software Development
Dennis de Champeaux, Al Anderson, Ed Feldhousen