University of Alabama in Huntsville

Displaying 1-3 of 3 results

  • White Papers // Sep 2009

    Authentication Protocol Using Quantum Superposition States

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to...

    Provided By University of Alabama in Huntsville

  • White Papers // Aug 2009

    An Approach Against a Computer Worm Attack

    Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper,...

    Provided By University of Alabama in Huntsville

  • White Papers // May 2008

    Combined Code Understanding and Comment Understanding

    Program comprehension necessitates the process of extracting properties from a program in order to achieve a better discernment of the software system under study. In this paper, the authors present a combined code and comment/identifier program comprehension approach that provides twice the input of existing approaches - whereas the latter...

    Provided By University of Alabama in Huntsville

  • White Papers // Sep 2009

    Authentication Protocol Using Quantum Superposition States

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to...

    Provided By University of Alabama in Huntsville

  • White Papers // May 2008

    Combined Code Understanding and Comment Understanding

    Program comprehension necessitates the process of extracting properties from a program in order to achieve a better discernment of the software system under study. In this paper, the authors present a combined code and comment/identifier program comprehension approach that provides twice the input of existing approaches - whereas the latter...

    Provided By University of Alabama in Huntsville

  • White Papers // Aug 2009

    An Approach Against a Computer Worm Attack

    Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper,...

    Provided By University of Alabama in Huntsville