Search
Now showing items 21-30 of 41
Nested signature blocks
(University of Hertfordshire, 1995)
For any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as ...
Geometric approach to Fletcher's ideal penalty function
(1995)
In this note, we derive a geometric formulation of an ideal penalty function for equality constrained problems. This differentiable penalty function requires no parameter estimation or adjustment, has numerical conditioning ...
Hades - towards the design of an asynchronous superscalar processor
(University of Hertfordshire, 1995)
Hades is a processor architecture aimed at single and multiple-instruction-issue asynchronous implementations. This paper uses a baseline version of Hades to illustrate some of the difficulties encountered in asynchronous ...
Remote booting in a hostile world: to whom am I speaking? [Computer security]
(1995)
Today's networked computer systems are very vulnerable to attack: terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in ...
Authentication v Certification
(University of Hertfordshire, 1995)
Authentication servers and certification authorities are usually viewed simply as alternative ways of providing the same service. In this paper we show that the differences in the natures of these two approaches are more ...
Technique for authentication, access control and resource management in open distributed systems
(1994)
A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism ...
Optimization and automatic differentiation in Ada : some practical experience
(1994)
This paper describes an investigation into the performance of three Ada packages for automatic differentiation. Two of these implement the forward accumulation approach while the third employs reverse accumulation. Each ...
Self authenticating proxies
(University of Hertfordshire, 1994)
Authentication and access control are usually implemented as two separate protection mechanisms because they are logically separate functions. A consistent approach to both of these functions is proposed in this paper. In ...
Shrink-wrapped optimism: the DODA approach to distributed document processing
(University of Hertfordshire, 1994)
In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ...
File server architecture for an open distributed document system
(University of Hertfordshire, 1994)
In this paper we will investigate design and implementation strategies for a file server in an open distributed document system. The aim of the open distributed document system is to provide and environment where a group ...