|
|
|
|
Wang, Hao
Microsoft Corp.
Redmond, Washington
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 18
reviews
|
|
|
|
|
|
|
|
Understanding cryptography: a textbook for students and practitioners Paar C., Pelzl J., Springer Publishing Company, Incorporated, New York, NY, 2009. 372 pp. Type: Book (978-3-642041-00-6)
Although cryptography has a long history--it is believed that the oldest known text to contain one of the essential components of cryptography occurred some 4,000 years ago in Egypt--the era of modern cryptography rea...
|
May 6 2010 |
|
|
|
|
|
|
Analyzing space/capacity tradeoffs of cooperative wireless networks using a probabilistic model of interference Lichte H., Valentin S., Karl H., Aad I., Widmer J. MSWiM 2009 (Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Tenerife, Canary Islands, Spain, Oct 26-29, 2009) 54-62, 2009. Type: Proceedings
Using relays--which consume hardware space--“in wireless networks can potentially lead to significant capacity increases. However, within an asynchronous multi-user communication setting, relaying might caus...
|
Feb 4 2010 |
|
|
|
|
|
|
A secure unidirectional proxy re-encryption using identity and secret key exchange Milgo E. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, South Carolina, Mar 19-21, 2009) 1-5, 2009. Type: Proceedings
In 1998, Blaze, Bleumer, and Strauss [1] proposed the concept of proxy re-cryptography (PRC), including proxy re-encryption (PRE) and proxy re-signature (PRS). A PRE scheme is a cryptosystem that allows a third party (proxy) to transfo...
|
Sep 23 2009 |
|
|
|
|
|
|
Limit theorems for queueing systems with doubly stochastic poisson arrivals (heavy traffic conditions) Afanas’eva L., Bashtova E. Problems of Information Transmission 44(4): 352-369, 2008. Type: Article
Queueing theory, generally considered a branch of operations research, is applicable in a wide variety of situations encountered in commerce, business, industry, public service, and engineering....
|
Jun 9 2009 |
|
|
|
|
|
|
Applied algebra: codes, ciphers and discrete algorithms Hardy D., Richman F., Walker C., Chapman & Hall/CRC, Boca Raton, FL, 2009. 424 pp. Type: Book (9781420071429), Reviews: (1 of 2)
This revised and updated second edition is a comprehensive textbook that expands mathematical coverage of finite fields, number theory, cryptography, and error-control/correcting codes. However, instead of providing a general mathemati...
|
May 5 2009 |
|
|
|
|
|
|
Primality testing and integer factorization in public-key cryptography Yan S., Springer Publishing Company, Incorporated, 2008. 374 pp. Type: Book (9780387772677)
Primality testing and integer factorization, two of the most important and fundamental research fields in computational number theory, are related problems. However, they are quite different algorithmically. The Agrawal-Kay...
|
Apr 23 2009 |
|
|
|
|
|
|
Certificate-based fair exchange protocol of signatures from pairings Shao Z. Computer Networks 52(16): 3075-3084, 2008. Type: Article
Many business transactions over the Internet involve the exchange of digital items between two parties; these items include emails, electronic contracts, and digital signatures. In order to facilitate such transactions, a noninteractiv...
|
Apr 17 2009 |
|
|
|
|
|
|
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key Paul G., Rathi S., Maitra S. Designs, Codes and Cryptography 49(1-3): 123-134, 2008. Type: Article
RC4, developed by Ron Rivest in 1987, is a widely used stream cipher in commercial software applications. Since no linear feedback shift registers (LFSRs) are used to implement RC4, it is ideal for software implementation. To produce a...
|
Feb 12 2009 |
|
|
|
|
|
|
A password-based grid security infrastructure Cai Z. Digital society (Proceedings of the Second International Conference on Digital Society,Feb 10-15, 2008) 157-164, 2008. Type: Proceedings
The open-source Globus Toolkit (GT) is used to build distributed computing systems and applications. In order to establish the identity of users and protect communications, the GT provides authentication and authorization based on the ...
|
Sep 9 2008 |
|
|
|
|
|
|
The six unsolved ciphers: inside the mysterious codes that have confounded the world’s greatest cryptographers Belfield R., Ulysses Press, 2007. 312 pp. Type: Book (9781569756287)
Because people love secrets, secret codes have forever excited the imagination of children and adults alike. From the earliest known use of cryptography in Egypt’s Old Kingdom to modern public-key cryptography, there are many...
|
Jun 10 2008 |
|
|
|
|
|
|
|
|
|
|
|