Sciweavers

20 search results - page 2 / 4
» The Structure of the Sense of Security, Anshin
Sort
View
DATE
2010
IEEE
156views Hardware» more  DATE 2010»
13 years 10 months ago
Spintronic memristor devices and application
—Spintronic memristor devices based upon spin torque induced magnetization motion are presented and potential application examples are given. The structure and material of these ...
Xiaobin Wang, Yiran Chen
ISW
2007
Springer
13 years 11 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
EUROCRYPT
2011
Springer
12 years 8 months ago
Unbounded HIBE and Attribute-Based Encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the sy...
Allison B. Lewko, Brent Waters
TON
2008
102views more  TON 2008»
13 years 5 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
CCS
2009
ACM
14 years 1 days ago
CoSP: a general framework for computational soundness proofs
We describe CoSP, a general framework for conducting computational soundness proofs of symbolic models and for embedding these proofs into formal calculi. CoSP considers arbitrary...
Michael Backes, Dennis Hofheinz, Dominique Unruh