Sciweavers

262 search results - page 3 / 53
» MONA Implementation Secrets
Sort
View
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 5 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
NAR
2011
222views Computer Vision» more  NAR 2011»
12 years 8 months ago
Effective - a database of predicted secreted bacterial proteins
Protein secretion is a key virulence mechanism of pathogenic and symbiotic bacteria, which makes the investigation of secreted proteins (‘effectors’) crucial for understanding...
Marc-André Jehl, Roland Arnold, Thomas Ratt...
TIFS
2008
152views more  TIFS 2008»
13 years 5 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
ICFP
2012
ACM
11 years 7 months ago
Addressing covert termination and timing channels in concurrent information flow systems
When termination of a program is observable by an adversary, confidential information may be leaked by terminating accordingly. While this termination covert channel has limited ...
Deian Stefan, Alejandro Russo, Pablo Buiras, Amit ...
TMC
2010
161views more  TMC 2010»
13 years 3 months ago
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
—Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropp...
Neal Patwari, Jessica Croft, Suman Jana, Sneha Kum...