1 resultado para PRIVATE SECURITY
em Universidad de Alicante
Filtro por publicador
- Adam Mickiewicz University Repository (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (1)
- Aston University Research Archive (8)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (3)
- Biblioteca Virtual del Sistema Sanitario Público de Andalucía (BV-SSPA), Junta de Andalucía. Consejería de Salud y Bienestar Social, Spain (1)
- Biodiversity Heritage Library, United States (3)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (1)
- Boston College Law School, Boston College (BC), United States (1)
- Brock University, Canada (15)
- CentAUR: Central Archive University of Reading - UK (1)
- CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal (3)
- Cochin University of Science & Technology (CUSAT), India (12)
- Coffee Science - Universidade Federal de Lavras (2)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (4)
- Consorci de Serveis Universitaris de Catalunya (CSUC), Spain (97)
- Cor-Ciencia - Acuerdo de Bibliotecas Universitarias de Córdoba (ABUC), Argentina (1)
- Digital Commons - Michigan Tech (1)
- Digital Commons at Florida International University (2)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (85)
- DRUM (Digital Repository at the University of Maryland) (1)
- Duke University (2)
- Galway Mayo Institute of Technology, Ireland (2)
- Georgian Library Association, Georgia (1)
- Glasgow Theses Service (1)
- Institute of Public Health in Ireland, Ireland (12)
- Instituto Politécnico do Porto, Portugal (14)
- Iowa Publications Online (IPO) - State Library, State of Iowa (Iowa), United States (378)
- Martin Luther Universitat Halle Wittenberg, Germany (2)
- Massachusetts Institute of Technology (1)
- Portal do Conhecimento - Ministerio do Ensino Superior Ciencia e Inovacao, Cape Verde (3)
- QSpace: Queen's University - Canada (1)
- RCAAP - Repositório Científico de Acesso Aberto de Portugal (2)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (8)
- Repositório da Escola Nacional de Administração Pública (ENAP) (1)
- Repositório da Produção Científica e Intelectual da Unicamp (2)
- Repositório da Universidade Federal do Espírito Santo (UFES), Brazil (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (4)
- Repositório Institucional da Universidade Federal do Rio Grande do Norte (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (4)
- Repositorio Institucional Universidad EAFIT - Medelin - Colombia (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (39)
- Scielo Saúde Pública - SP (22)
- Scottish Institute for Research in Economics (SIRE) (SIRE), United Kingdom (8)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad de Alicante (1)
- Universidad del Rosario, Colombia (11)
- Universidad Politécnica de Madrid (1)
- Universidade do Minho (6)
- Universidade Federal do Rio Grande do Norte (UFRN) (2)
- Universidade Técnica de Lisboa (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (26)
- Université de Lausanne, Switzerland (79)
- Université de Montréal (1)
- Université de Montréal, Canada (35)
- University of Michigan (11)
- University of Queensland eSpace - Australia (53)
Resumo:
As the user base of the Internet has grown tremendously, the need for secure services has increased accordingly. Most secure protocols, in digital business and other fields, use a combination of symmetric and asymmetric cryptography, random generators and hash functions in order to achieve confidentiality, integrity, and authentication. Our proposal is an integral security kernel based on a powerful mathematical scheme from which all of these cryptographic facilities can be derived. The kernel requires very little resources and has the flexibility of being able to trade off speed, memory or security; therefore, it can be efficiently implemented in a wide spectrum of platforms and applications, either software, hardware or low cost devices. Additionally, the primitives are comparable in security and speed to well known standards.