Sciweavers

29 search results - page 3 / 6
» Preventing Information Leaks through Shadow Executions
Sort
View
FC
2004
Springer
105views Cryptology» more  FC 2004»
13 years 11 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
ISW
2005
Springer
13 years 11 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
TIFS
2010
130views more  TIFS 2010»
13 years 16 days ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
INFOCOM
2006
IEEE
13 years 12 months ago
A Joint Design of Distributed QoS Scheduling and Power Control for Wireless Networks
— The capacity of a power controlled wireless network can be changing due to user’s mobility, fading or shadowing effects. As a result, the quality of service (QOS) of users ac...
Chun-Chia Chen, Duan-Shin Lee
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 3 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...