University of Alabama in Huntsville

Displaying 1-2 of 2 results

  • White Papers // Sep 2009

    Authentication Protocol Using Quantum Superposition States

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to...

    Provided By University of Alabama in Huntsville

  • White Papers // Aug 2009

    An Approach Against a Computer Worm Attack

    Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper,...

    Provided By University of Alabama in Huntsville

  • White Papers // Sep 2009

    Authentication Protocol Using Quantum Superposition States

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to...

    Provided By University of Alabama in Huntsville

  • White Papers // Aug 2009

    An Approach Against a Computer Worm Attack

    Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper,...

    Provided By University of Alabama in Huntsville