1 resultado para PRIVATE SECURITY
em Universidad de Alicante
Filtro por publicador
- Repository Napier (2)
- Aberystwyth University Repository - Reino Unido (10)
- Adam Mickiewicz University Repository (4)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- Aquatic Commons (42)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (7)
- Aston University Research Archive (8)
- B-Digital - Universidade Fernando Pessoa - Portugal (1)
- Biblioteca Digital da Câmara dos Deputados (1)
- Biblioteca Digital de la Universidad Católica Argentina (1)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (8)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (1)
- Boston University Digital Common (6)
- Brock University, Canada (15)
- Cambridge University Engineering Department Publications Database (11)
- Carolina Law Scholarship Repository (1)
- CentAUR: Central Archive University of Reading - UK (1)
- Center for Jewish History Digital Collections (5)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (15)
- Coffee Science - Universidade Federal de Lavras (2)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (4)
- CORA - Cork Open Research Archive - University College Cork - Ireland (3)
- Cornell: DigitalCommons@ILR (5)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (1)
- Digital Commons - Michigan Tech (1)
- Digital Commons at Florida International University (2)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (3)
- DRUM (Digital Repository at the University of Maryland) (3)
- Duke University (6)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (6)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (1)
- Glasgow Theses Service (1)
- Greenwich Academic Literature Archive - UK (16)
- Helda - Digital Repository of University of Helsinki (30)
- Indian Institute of Science - Bangalore - Índia (14)
- Instituto Politécnico do Porto, Portugal (8)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (3)
- QSpace: Queen's University - Canada (3)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (205)
- Queensland University of Technology - ePrints Archive (374)
- RCAAP - Repositório Científico de Acesso Aberto de Portugal (2)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (3)
- Repositório digital da Fundação Getúlio Vargas - FGV (4)
- Repositório Institucional da Universidade de Aveiro - Portugal (2)
- Repositório Institucional da Universidade Federal do Rio Grande do Norte (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (4)
- Repositorio Institucional Universidad EAFIT - Medelin - Colombia (1)
- Research Open Access Repository of the University of East London. (7)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (20)
- SAPIENTIA - Universidade do Algarve - Portugal (1)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- South Carolina State Documents Depository (1)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad de Alicante (1)
- Universidad del Rosario, Colombia (10)
- Universidad Politécnica de Madrid (1)
- Universidade Federal do Rio Grande do Norte (UFRN) (2)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (1)
- Université de Lausanne, Switzerland (4)
- Université de Montréal (1)
- Université de Montréal, Canada (27)
- University of Michigan (11)
- WestminsterResearch - UK (16)
- Worcester Research and Publications - Worcester Research and Publications - UK (1)
Resumo:
As the user base of the Internet has grown tremendously, the need for secure services has increased accordingly. Most secure protocols, in digital business and other fields, use a combination of symmetric and asymmetric cryptography, random generators and hash functions in order to achieve confidentiality, integrity, and authentication. Our proposal is an integral security kernel based on a powerful mathematical scheme from which all of these cryptographic facilities can be derived. The kernel requires very little resources and has the flexibility of being able to trade off speed, memory or security; therefore, it can be efficiently implemented in a wide spectrum of platforms and applications, either software, hardware or low cost devices. Additionally, the primitives are comparable in security and speed to well known standards.