Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Data (E) > Data Encryption (E.3) > Standards (E.3...)  
 
Options:
 
  1-10 of 26 Reviews about "Standards (E.3...)": Date Reviewed
   Assurance for federated identity management
Baldwin A., Casassa Mont M., Beres Y., Shiu S.  Journal of Computer Security 18(4): 541-572, 2010. Type: Article

Even though identity management solutions have existed for some time, the advent of social networks, content management system (CMS) platforms, and cloud computing has brought some much needed advances in this technology. Federated identity manage...

Oct 6 2010
  Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture
Strydis C., Zhu D., Gaydadjiev G.  Computing frontiers (Proceedings of the 2008 Conference on Computing Frontiers, Ischia, Italy,  May 5-7, 2008) 231-240, 2008. Type: Proceedings

Biomedical microelectronic implants (BMI) are useful actuators and diagnostic devices in applications such as intra-cardiac defibrillators, implantable pacemakers, and blood or gastric pressure measurement. BMIs are capable of accepting commands t...

Oct 3 2008
  Encryption technologies: testing and identifying campus needs
Fritsche G., Rodgers S.  User services (Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services, Orlando, Florida,  Oct 7-10, 2007) 109-112, 2007. Type: Proceedings

It is no surprise that universities are worried about data security, or that they appoint committees to solve the problem. This paper details Lehigh University’s investigation into campus-wide security issues, including recommendations f...

Jan 11 2008
  Multivariate public key cryptosystems (Advances in Information Security)
Ding J., Gower J., Schmidt D.,  Springer-Verlag New York, Inc., Secaucus, NJ, 2006. 260 pp. Type: Book (9780387322292)

Multivariate public key cryptosystems (MPKC), developed in the last ten years, have become a potential alternative to number theoretic-based cryptography (in this book, all comparisons regarding security and encryption complexity use the RSA crypt...

Mar 2 2007
  On pedagogically sound examples in public-key cryptography
Chong S., Farr G., Frost L., Hawley S.  Computer science 2006 (Proceedings of the 48th Conference on Computer Science, Hobart, Australia,  Jan 16-19, 2006) 63-68, 2006. Type: Proceedings

This paper is dedicated to helping students learn to apply algorithms used in public key cryptography. The basic idea is that pencil-and-paper exercises in public key cryptography are important in order to learn the subject. It is important that a...

Oct 12 2006
  Index calculation attacks on RSA signature and encryption
Coron J., Naccache D., Desmedt Y., Odlyzko A., Stern J.  Designs, Codes and Cryptography 38(1): 41-53, 2006. Type: Article

This paper reports on a chosen ciphertext attack on the use of the RSA algorithm for digital signatures. It also describes a related attack on RSA-based privacy, but the main interest is in signatures. This attack is applied to a working encryptio...

Jul 3 2006
  Trusted computing platforms: TCPA technology in context
Pearson S.,  Prentice Hall PTR, Upper Saddle River, NJ, 2002. 352 pp. Type: Book (9780130092205)

A trusted platform is a computing platform that, through the presence of a trusted hardware component, provides the foundation of trust for software processes running on the platform. The trusted platform module (TPM) is defined as the hardware ro...

Feb 27 2006
  Cryptanalysis of Huang-Chang partially blind signature scheme
Zhang F., Chen X.  Journal of Systems and Software 76(3): 323-325, 2005. Type: Article

A partially blind signature is an extension of a blind signature that allows a signer to sign a partially blinded message that includes pre-agreed upon information, such as an expiration date, or collateral conditions on the resulting signatures. ...

Nov 9 2005
  Brute force: cracking the data encryption standard
Curtin M.,  Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 291 pp. Type: Book (9780387201092)

Curtin tells the story of the achievement of thousands of volunteers, who in 1997 were able to show that the data encryption standard (DES) was too weak as a cryptographic algorithm. Their effort was in response to a January 1997 contest initiated...

Oct 28 2005
  Towards minimal addition-subtraction chains using genetic algorithms
Nedjah N., Mourelle L.  In Biocomputing. Commack, NY: Nova Science Publishers, Inc., 2003. Type: Book Chapter

The basic question addressed in this chapter is this: given a positive integer E, and given a multiplicative semigroup, what is the smallest number of multiplications and/or divisions needed to compute elements of the semigroup ...

Jun 29 2005
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy