Sciweavers

54 search results - page 3 / 11
» Towards the impact of the operational environment on the sec...
Sort
View
CCS
2010
ACM
13 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CAISE
2008
Springer
13 years 6 months ago
Towards a Framework for B2B Integration Readiness Assessment and Guided Support of the SMEs
In today's world with companies operating in a global business environment. Most enterprises, and especially the SMEs, lack the necessary business culture, technical and non-t...
Spiros Mouzakitis, Fenareti Lampathaki, Dimitris A...
ACISP
2006
Springer
13 years 10 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
CCS
2007
ACM
13 years 11 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
JUCS
2010
89views more  JUCS 2010»
13 years 3 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl