Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Brian A. Lamacchia"'
Publikováno v:
Communications of the ACM. 41:74-83
Publikováno v:
Computer Networks and ISDN Systems. 29:953-964
Digital signatures provide a mechanism for guaranteeing integrity and authenticity of Web content but not more general notions of security or trust. Web-aware applications must permit users to state clearly their own security policies and, of course,
Autor:
Brian A. Lamacchia
Publikováno v:
Computer Networks and ISDN Systems. 29:1237-1248
We describe in this paper the Internet Fish Construction Kit, a tool for building persistent, personal, dynamic information gatherers (“Internet Fish”) [3] for the World-Wide Web. Internet Fish ( IFish ) differ from current resource discovery too
Autor:
Barbara Fox, Brian A. Lamacchia
Publikováno v:
Communications of the ACM. 46:61-63
Create subsets of fair uses---safe harbors---that are allowed without the explicit permission of copyright holders.
Autor:
Matthijs J. Coster, Brian A. Lamacchia, Jacques Stern, Antoine Joux, Claus-Peter Schnorr, Andrew Odlyzko
Publikováno v:
Computational Complexity. 2:111-128
The general subset sum problem is NP-complete. However, there are two algorithms, one due to Brickell and the other to Lagarias and Odlyzko, which in polynomial time solve almost all subset sum problems of sufficiently low density. Both methods rely
Autor:
Brian A. Lamacchia, Andrew Odlyzko
Publikováno v:
Designs, Codes and Cryptography. 1:47-62
The presumed difficulty of computing discrete logarithms in finite fields is the basis of several popular public key cryptosystems. The secure identification option of the Sun Network File System, for example, uses discrete logarithms in a field GF(p
Autor:
Brian A. Lamacchia, Andrew Odlyzko
Publikováno v:
Advances in Cryptology-CRYPT0’ 90 ISBN: 9783540545088
CRYPTO
CRYPTO
Many of the fast methods for factoring integers and computing discrete logarithms require the solution of large sparse linear systems of equations over finite fields. This paper presents the results of implementations of several linear algebra algori
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cbae942b15468c699cf01c14d1021e89
https://doi.org/10.1007/3-540-38424-3_8
https://doi.org/10.1007/3-540-38424-3_8
Publikováno v:
Provable Security ISBN: 9783540756699
ProvSec
ProvSec
Recent work by Krawczyk [12] and Menezes [16] has highlighted the importance of understanding well the guarantees and limitations of formal security models when using them to prove the security of protocols. In this paper we focus on security models
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::39e5368adc8e80a552bb23106fd14c67
https://doi.org/10.1007/978-3-540-75670-5_1
https://doi.org/10.1007/978-3-540-75670-5_1
Autor:
G. Wasson, Brian A. Lamacchia, Norm Beekwilder, B. Dillaway, Jun Feng, J. Hogg, Marty Humphrey, Sang-Min Park
Publikováno v:
GRID
Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. In this paper, we explicitly identify requirements for an access control po
Publikováno v:
Advances in Cryptology — EUROCRYPT ’91 ISBN: 9783540546207
EUROCRYPT
EUROCRYPT
The general subset sum problem is NP-complete. However, there are two algorithms, one due to Brickell and the other to Lagarias and Odlyzko, which in polynomial time solve almost all subset sum problems of sufficiently low density. Both methods rely
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e9f4c14c12403f1a1d6b59055b6cb1b3
https://doi.org/10.1007/3-540-46416-6_4
https://doi.org/10.1007/3-540-46416-6_4