Sciweavers

6164 search results - page 1197 / 1233
» Teaching Computer Security
Sort
View
131
Voted
IJSNET
2008
118views more  IJSNET 2008»
15 years 2 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
CORR
2007
Springer
127views Education» more  CORR 2007»
15 years 2 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
15 years 2 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
SAC
2006
ACM
15 years 2 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
TELSYS
2008
85views more  TELSYS 2008»
15 years 2 months ago
Trustworthy Web services provisioning for differentiated customer services
With the number of e-Business applications dramatically increasing, a service level agreement (SLA) will play an important part in Web services. The SLA is a combination of severa...
Kaiqi Xiong, Harry G. Perros
« Prev « First page 1197 / 1233 Last » Next »