1 resultado para Software Security
em Universidad de Alicante
Filtro por publicador
- JISC Information Environment Repository (2)
- Repository Napier (4)
- University of Cagliari UniCA Eprints (1)
- Aberystwyth University Repository - Reino Unido (14)
- Adam Mickiewicz University Repository (3)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (6)
- Aquatic Commons (43)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (31)
- Aston University Research Archive (2)
- B-Digital - Universidade Fernando Pessoa - Portugal (2)
- Biblioteca Digital da Câmara dos Deputados (3)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (2)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (15)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (2)
- Boston University Digital Common (10)
- Bulgarian Digital Mathematics Library at IMI-BAS (1)
- CaltechTHESIS (1)
- Cambridge University Engineering Department Publications Database (74)
- Carolina Law Scholarship Repository (1)
- Center for Jewish History Digital Collections (3)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (82)
- Coffee Science - Universidade Federal de Lavras (2)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (1)
- CORA - Cork Open Research Archive - University College Cork - Ireland (7)
- Cornell: DigitalCommons@ILR (5)
- CUNY Academic Works (1)
- Deakin Research Online - Australia (26)
- Digital Commons at Florida International University (1)
- Digital Peer Publishing (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (1)
- DRUM (Digital Repository at the University of Maryland) (4)
- Duke University (4)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (8)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (8)
- Greenwich Academic Literature Archive - UK (25)
- Helda - Digital Repository of University of Helsinki (16)
- Indian Institute of Science - Bangalore - Índia (49)
- Infoteca EMBRAPA (11)
- Instituto Politécnico do Porto, Portugal (1)
- Massachusetts Institute of Technology (5)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (5)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QSpace: Queen's University - Canada (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (80)
- Queensland University of Technology - ePrints Archive (384)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositório do ISCTE - Instituto Universitário de Lisboa (2)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (4)
- Research Open Access Repository of the University of East London. (4)
- Universidad de Alicante (1)
- Universidad del Rosario, Colombia (1)
- Universidad Politécnica de Madrid (2)
- Universidade Federal do Pará (1)
- Universidade Federal do Rio Grande do Norte (UFRN) (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (2)
- University of Michigan (2)
- University of Queensland eSpace - Australia (13)
Resumo:
As the user base of the Internet has grown tremendously, the need for secure services has increased accordingly. Most secure protocols, in digital business and other fields, use a combination of symmetric and asymmetric cryptography, random generators and hash functions in order to achieve confidentiality, integrity, and authentication. Our proposal is an integral security kernel based on a powerful mathematical scheme from which all of these cryptographic facilities can be derived. The kernel requires very little resources and has the flexibility of being able to trade off speed, memory or security; therefore, it can be efficiently implemented in a wide spectrum of platforms and applications, either software, hardware or low cost devices. Additionally, the primitives are comparable in security and speed to well known standards.