Sciweavers

22 search results - page 3 / 5
» Integrity Codes: Message Integrity Protection and Authentica...
Sort
View
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
13 years 10 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
DSN
2005
IEEE
13 years 10 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
FM
2006
Springer
153views Formal Methods» more  FM 2006»
13 years 8 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
TWC
2008
76views more  TWC 2008»
13 years 4 months ago
A Reduced-PAR Opportunistic STBC Scheme for Frequency-Selective Channels in the Presence of Frequency Offset
Opportunistic space-time block codes (STBC) have been investigated for flat-fading channels in the literature. In this paper, we present a novel scheme for integrating them with or...
Dandan Wang, Hlaing Minn, Naofal Al-Dhahir
AFRICACRYPT
2010
Springer
13 years 11 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...