Sciweavers

1770 search results - page 234 / 354
» Writing requirements in computer security
Sort
View
CCGRID
2001
IEEE
14 years 2 months ago
Replica Selection in the Globus Data Grid
The Globus Data Grid architecture provides a scalable infrastructure for the management of storage resources and data that are distributed across Grid environments. These services...
Sudharshan Vazhkudai, Steven Tuecke, Ian T. Foster
ASIACRYPT
2003
Springer
14 years 3 months ago
Cryptanalysis of 3-Pass HAVAL
HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its has a structure that is quite similar to other well-known hash functions such as MD4 and...
Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos...
MSS
1999
IEEE
112views Hardware» more  MSS 1999»
14 years 2 months ago
HPSS at Los Alamos: Experiences and Analysis
The High Performance Storage System (HPSS) is currently deployed on the open and secure networks at Los Alamos National Laboratory (LANL). Users of the Accelerated Strategic Compu...
Per Lysne, Gary Lee, Lynn Jones, Mark Roschke
NSDI
2008
14 years 20 days ago
Using Salience Differentials to Making Visual Cues Noticeable
There is a large body of research on how to design user interfaces for systems so as to ensure that important messages from the systems are presented to the user to maximize the p...
Andreas P. Heiner, N. Asokan
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 10 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak