Filters








17,863 Hits in 3.3 sec

Pairing-Based Cryptography: Past, Present, and Future [chapter]

Dan Boneh
2012 Lecture Notes in Computer Science  
A few examples include collusionresistant broadcast encryption and traitor tracing with short keys, 3-way Diffie-Hellman, and short signatures.  ...  While pairings were first introduced in cryptography as a tool to attack the discrete-log problem on certain elliptic curves, they have since found numerous applications in the construction of cryptographic  ...  In particular we explain where the current techniques fail and outline a few potential directions for future progress.  ... 
doi:10.1007/978-3-642-34961-4_1 fatcat:t37a37zs5bbq5hpsaeeo66c2de

Cryptography and the French Banking Cards: Past, Present, Future [chapter]

Jacques Stern
2004 Lecture Notes in Computer Science  
The Future With triple DES, RSA, and DDA on board, the French banking cards are reaching a high level of cryptographic sophistication.  ...  The cryptography of the French Banking cards RSA authentication is based on an RSA signature of the card number and other related data.  ... 
doi:10.1007/978-3-540-27809-2_7 fatcat:p3vt6h3s2zdn3htvsjtzr55ija

Cybersecurity: Past, Present and Future [article]

Shahid Alam
2022 arXiv   pre-print
We must learn from the past, evolve our present and improve the future. Based on this objective, the book covers the past, present, and future of these main specializations of cybersecurity.  ...  This book is an effort to introduce the reader to the field of cybersecurity, highlight current issues and challenges, and provide future directions to mitigate or resolve them.  ...  Organization of the Book This chapter has provided a peek into the past, present and future of cybersecurity.  ... 
arXiv:2207.01227v1 fatcat:vfx54hq3ejc7dlfestj6dkstpa

Internet security standards: past, present, and future

Stephen Kent
1994 StandardView  
The model assumes the use of end-to-end cryptographic protection at the network layer for most user-oriented security services and the use of link layer cryptography for trafftc-flow confidentiality.  ...  In the DOD environment, the threats are such that the only accepted means of providing high-quality security in a large, geographically distributed network is through the application of cryptography.  ...  Despite the focus on and the preference for use of public-key cryptography, PEM also defines means for using symmetric cryptography for the primary security services.  ... 
doi:10.1145/202949.202954 fatcat:lktt2jl5ljaxjloa3paoorh7o4

AI Evaluation: past, present and future [article]

Jose Hernandez-Orallo
2016 arXiv   pre-print
We describe the limitations of the many evaluation settings and competitions in these three categories and propose several ideas for a more systematic and robust evaluation.  ...  We see that black-box (behavioural evaluation) is becoming more and more common, as AI systems are becoming more complex and unpredictable.  ...  AI Evaluation: past, present and future∗ José Hernández-Orallo  ... 
arXiv:1408.6908v3 fatcat:6g5h2nzaezey5a3qy3us7lnkvu

Information Science: Its Past, Present and Future

Xue-Shan Yan
2011 Information  
Early in its history and development, there were three types of classical information sciences: computer and information science, library and information science, telecommunications and information science  ...  For such a large community, a systematization, two trends of thought, some perspectives and suggestions are discussed in this paper.  ...  and still is the great motivating force and source in my work.  ... 
doi:10.3390/info2030510 fatcat:vmmej6v6qbdtxfhjqqky56r2da

Past, Present and Future of Research in the Information Society

Kerry Smith, W Shrum, K Benson, W Bijker, K Brunnstein
2007 Australian Academic and Research Libraries  
Since the cryptanalysis concepts are highly specialized and complex, we concentrate here only on some of the key mathematical concepts behind cryptography. cryptology is made up of cryptography and cryptanalysis  ...  Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.  ...  Thus the receiver can present data and the digital signature to a third party as evidence if any dispute arises in the future.  ... 
doi:10.1080/00048623.2007.10721285 fatcat:5kia2etpcbh5zavkxuge4o74uu

GIMI: the past, the present and the future

A. Simpson, D. Power, D. Russell, M. Slaymaker, V. Bailey, C. Tromans, M. Brady, L. Tarassenko
2010 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
In keeping with the theme of this year's e-Science All Hands Meeting-past, present and future-we consider the motivation for, the current status of, and the future directions for, the technologies developed  ...  GIMI was funded by the UK's Technology Strategy Board with the intention of developing a service-oriented framework to facilitate the secure sharing and aggregation of heterogeneous data from disparate  ...  Igor Toujilov, Gordon Wilcock and Moi Hoon Yap.  ... 
doi:10.1098/rsta.2010.0153 pmid:20643683 fatcat:2qej4mezazfgxn7jnv6id7ezpe

Past, Present and Future of Quantum Computing: A Systematic Study

Palash Dutta Banik, Asoke Nath
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
So, we can say that quantum computers rather than quantum computing will be used in the near future to replace classical computing.  ...  Quantum computers are way better and faster than classical computers.  ...  CONCLUTION AND FUTURE SCOPES In the near future -perhaps within 5 to 10 years, but who knows, maybe a lot sooner -quantum computing will be at a stage where it can be used to solve problems that improve  ... 
doi:10.32628/cseit217694 fatcat:pq76n2tyljcoxmkazmdiizt6ci

Power System Control Centers: Past, Present, and Future

F.F. Wu, K. Moslehi, A. Bose
2005 Proceedings of the IEEE  
In this paper, we review the functions and architectures of control centers: their past, present, and likely future.  ...  A Grid service-based future control center is stipulated.  ...  Zhou and Dr. A. B. R. Kumar for their assistance in the preparation of this paper.  ... 
doi:10.1109/jproc.2005.857499 fatcat:pz4c6mjbovhhdmwrnyz6gfjz3a

Quantum Computing @ MIT: The Past, Present, and Future of the Second Revolution in Computing [article]

Francisca Vasconcelos
2020 arXiv   pre-print
In Fall 2018, four MIT faculty -- Isaac Chuang, Dirk Englund, Aram Harrow, and William Oliver -- at the forefront of quantum computation and information research were interviewed.  ...  There has been a lot of recent media hype surrounding quantum computation, so in this article we present an academic view of the matter, specifically highlighting progress being made at MIT.  ...  And that has worked very well." Both groups have grown significantly over the past few years.  ... 
arXiv:2002.05559v2 fatcat:tftkmbkxtjhmbiwcel7ejhbeca

The Past, Evolving Present, and Future of the Discrete Logarithm [chapter]

Antoine Joux, Andrew Odlyzko, Cécile Pierrot
2014 Open Problems in Mathematics and Computational Science  
This paper presents a current 1 survey of the state of the art concerning discrete logarithms and their computation.  ...  This intractability hypothesis is also the foundation for the security of a large variety of other public key systems and protocols.  ...  It gives pointers to the latest results and presents observations about the current status and likely future of the DLP.  ... 
doi:10.1007/978-3-319-10683-0_2 fatcat:ykp3rhh2lnhn5ml4otrrfszoii

From David to Goliath: Past, Present, and Future of the Foundation

Brandon Tang
2016 Journal of Student Science and Technology  
I am constantly humbled by the enthusiasm, talent, and passion of students involved with the Foundation for Student Science and Technology.  ...  I have witnessed the greatest growth in the history of our organization, from a local journal to a national presence, over the past four years.  ...  We have an even brighter future ahead and more importantly, so do the students across Canada who we serve.  ... 
doi:10.13034/jsst.v9i1.144 fatcat:4q2lh7s4snb5debkfes7v4okwi

Past, present, and future of the concept of information

Rafael Capurro
2009 tripleC: Communication, Capitalism & Critique  
Establishing a connection between the concepts of information and message several options are presented leading to a concept of information based on a theory of messages.  ...  It connects the Latin etymology of the term informatio with the Greek concepts of eidos/idea and morphé and shows how the objective meaning of information ('giving form to something') becomes obsolete  ...  What positive and productive sense might arise from the analysis of the past, present, and future of the concept of information?  ... 
doi:10.31269/vol7iss2pp125-141 fatcat:j62vcger5babximnevilzz7aoq

Past, present, and future of the concept of information

Rafael Capurro
2009 tripleC: Communication, Capitalism & Critique  
Establishing a connection between the concepts of information and message several options are presented leading to a concept of information based on a theory of messages.  ...  It connects the Latin etymology of the term informatio with the Greek concepts of eidos/idea and morphé and shows how the objective meaning of information ('giving form to something') becomes obsolete  ...  What positive and productive sense might arise from the analysis of the past, present, and future of the concept of information?  ... 
doi:10.31269/triplec.v7i2.113 fatcat:mi3dolsgifcpfiqtash7idjoo4
« Previous Showing results 1 — 15 out of 17,863 results