-
1
-
-
0030701223
-
Misplaced trust: Kerberos 4 session keys
-
IEEE Press, Los Alamitos, CA
-
Dole B., Lodin S., and Spafford S.E. Misplaced trust: Kerberos 4 session keys. Proceedings of the 4th Symposium on Network and Distributed System Security (1997), IEEE Press, Los Alamitos, CA 60-71
-
(1997)
Proceedings of the 4th Symposium on Network and Distributed System Security
, pp. 60-71
-
-
Dole, B.1
Lodin, S.2
Spafford, S.E.3
-
2
-
-
0029539547
-
SciAgents-an agent based environment for distributed, cooperative scientific computing
-
IEEE Press, Los Alamitos, CA
-
Drashansky T., Joshi A., and Rice J.R. SciAgents-an agent based environment for distributed, cooperative scientific computing. Proceedings of the 7th International Conference on Tools with Artificial Intelligence (1995), IEEE Press, Los Alamitos, CA 452-459
-
(1995)
Proceedings of the 7th International Conference on Tools with Artificial Intelligence
, pp. 452-459
-
-
Drashansky, T.1
Joshi, A.2
Rice, J.R.3
-
3
-
-
77956726556
-
Software architecture of ubiquitous scientific computing environments for mobile platforms
-
Department of Computer Sciences
-
Drashansky T., Weerawarana S., Joshi A., Weerasinghe R., and Houstis E.N. Software architecture of ubiquitous scientific computing environments for mobile platforms. CSD-TR-95-032 (1995), Department of Computer Sciences
-
(1995)
CSD-TR-95-032
-
-
Drashansky, T.1
Weerawarana, S.2
Joshi, A.3
Weerasinghe, R.4
Houstis, E.N.5
-
4
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
Advances in Cryptology. Guldwasser (Ed), Springer Verlag, New York
-
Matsumoto T., Kato K., and Imai H. Speeding up secret computations with insecure auxiliary devices. In: Guldwasser (Ed). Advances in Cryptology. Lecture Notes in Computer Science Vol. 658 (1988), Springer Verlag, New York 497-506
-
(1988)
Lecture Notes in Computer Science
, vol.658
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
9
-
-
0005301490
-
On data banks and privacy homomorphisms
-
DeMillo R.D. (Ed), Academic Press, San Diego, CA
-
Rivest R.L., Adleman L., and Dertouzos M.L. On data banks and privacy homomorphisms. In: DeMillo R.D. (Ed). Foundations of Secure Computation (1978), Academic Press, San Diego, CA 169-177
-
(1978)
Foundations of Secure Computation
, pp. 169-177
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
11
-
-
77956774673
-
Some active attacks on fast serveraided secret computation protocols for modular exponentiation
-
Hwang S.-J., Chang C.-C., and Yang W.-P. Some active attacks on fast serveraided secret computation protocols for modular exponentiation. Cryptography: Policy and Algorithms, LNCS 1029 (1996) 215-228
-
(1996)
Cryptography: Policy and Algorithms, LNCS
, vol.1029
, pp. 215-228
-
-
Hwang, S.-J.1
Chang, C.-C.2
Yang, W.-P.3
-
13
-
-
84957648348
-
Security and performance of server-aided RSA computation protocols
-
Santa Barbara, CA
-
Lim C.-H., and Lee P.J. Security and performance of server-aided RSA computation protocols. Proceedings 15th. International Cryptology Conference. Santa Barbara, CA (1995) 70-83
-
(1995)
Proceedings 15th. International Cryptology Conference
, pp. 70-83
-
-
Lim, C.-H.1
Lee, P.J.2
-
14
-
-
79958247758
-
Secure addition sequence and its application on the server-aided secret computation protocols
-
Advances in Cryptology. Sebevry, and Zheng (Eds), Springer Verlag, New York
-
Laih C.-S., and Yen S.-M. Secure addition sequence and its application on the server-aided secret computation protocols. In: Sebevry, and Zheng (Eds). Advances in Cryptology. Lecture Notes in Computer Science Vol. 718 (1992), Springer Verlag, New York 219-230
-
(1992)
Lecture Notes in Computer Science
, vol.718
, pp. 219-230
-
-
Laih, C.-S.1
Yen, S.-M.2
-
15
-
-
84955578798
-
Attacks on protocols for server-aided RSA computation
-
EUROCRYPT'92. Rueppel (Ed), Springer Verlag, Berlin
-
Pfitzmann B., and Waidner M. Attacks on protocols for server-aided RSA computation. In: Rueppel (Ed). EUROCRYPT'92. Lecture Notes in Computer Science Vol. 903 (1992), Springer Verlag, Berlin 153-162
-
(1992)
Lecture Notes in Computer Science
, vol.903
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
16
-
-
0005063381
-
Speeding up Smart Card RSA computations with insecure co-processors
-
North Holland, Amsterdam
-
Quisquater J.-J., and de Soete M. Speeding up Smart Card RSA computations with insecure co-processors. Smart Card 2000 (1991), North Holland, Amsterdam 191-197
-
(1991)
Smart Card 2000
, pp. 191-197
-
-
Quisquater, J.-J.1
de Soete, M.2
-
22
-
-
0024732375
-
A fast adaptive grid scheme for elliptic partial differential equations
-
Ribbens C.J. A fast adaptive grid scheme for elliptic partial differential equations. ACM Transactions on Mathematical Software 15 (1989) 179-197
-
(1989)
ACM Transactions on Mathematical Software
, vol.15
, pp. 179-197
-
-
Ribbens, C.J.1
-
23
-
-
77956755876
-
Parallelization of adaptive grid domain mapping
-
Rodrique G. (Ed), SIAM, Philadelphia, PA
-
Ribbens C.J. Parallelization of adaptive grid domain mapping. In: Rodrique G. (Ed). Parallel Processing for Scientific Computing (1989), SIAM, Philadelphia, PA 196-200
-
(1989)
Parallel Processing for Scientific Computing
, pp. 196-200
-
-
Ribbens, C.J.1
-
24
-
-
0003231932
-
-
National Bureau Standards, US Government Printing Office
-
Abramowitz M., and Stegun I.A. Handbook of Mathematical Functions. Applied Mathamatics Series 55 (1964), National Bureau Standards, US Government Printing Office
-
(1964)
Applied Mathamatics Series
, vol.55
-
-
Abramowitz, M.1
Stegun, I.A.2
-
25
-
-
0042968690
-
An adaptive algorithm for multivariate approximation giving optimal convergence rates
-
deBoor C., and Rice J.R. An adaptive algorithm for multivariate approximation giving optimal convergence rates. Journal of Approximation Theory 25 (1979) 337-359
-
(1979)
Journal of Approximation Theory
, vol.25
, pp. 337-359
-
-
deBoor, C.1
Rice, J.R.2
-
30
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Department Computer Science, University of Auckland
-
Collberg C., Thomborson C., and Low D. A taxonomy of obfuscating transformations. Technical Report 148 (1988), Department Computer Science, University of Auckland
-
(1988)
Technical Report 148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
|