Sciweavers

19003 search results - page 200 / 3801
» We Need Assurance!
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 5 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
ACISP
2008
Springer
14 years 5 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
ICAC
2007
IEEE
14 years 5 months ago
Server-Level Power Control
We present a technique that controls the peak power consumption of a high-density server by implementing a feedback controller that uses precise, system-level power measurement to ...
Charles Lefurgy, Xiaorui Wang, Malcolm Ware
ZEUS
2010
153views Communications» more  ZEUS 2010»
14 years 5 days ago
Estimating costs of a service
When designing a publicly available Web service, a service designer has to take care of costs and revenue caused by this services. In the very beginning possible partners might onl...
Christian Gierds, Jan Sürmeli
DEBU
2010
138views more  DEBU 2010»
13 years 8 months ago
A Rule-Based Citation System for Structured and Evolving Datasets
We consider the requirements that a citation system must fulfill in order to cite structured and evolving data sets. Such a system must take into account variable granularity, con...
Peter Buneman, Gianmaria Silvello