Sciweavers

524 search results - page 3 / 105
» On the Security of the DeKaRT Primitive
Sort
View
IJNSEC
2006
56views more  IJNSEC 2006»
13 years 5 months ago
New Class of Cryptographic Primitives and Cipher Design for Networks Security
Nikolay A. Moldovyan, Alexander A. Moldovyan, Ma A...
TRETS
2010
62views more  TRETS 2010»
13 years 13 hour ago
Security Primitives for Reconfigurable Hardware-Based Systems
Ted Huffmire, Timothy E. Levin, Thuy D. Nguyen, Cy...
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
13 years 8 days ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
ADHOCNOW
2010
Springer
13 years 6 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
CSFW
2000
IEEE
13 years 9 months ago
Possibilistic Definitions of Security - An Assembly Kit
We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of security is formalized as a security predicate by ass...
Heiko Mantel