Sciweavers

878 search results - page 104 / 176
» A Compiler-Based Approach to Data Security
Sort
View
150
Voted
ISSA
2008
15 years 5 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
109
Voted
CSREASAM
2008
15 years 5 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way
WISEC
2010
ACM
15 years 3 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
125
Voted
ISCAS
2006
IEEE
155views Hardware» more  ISCAS 2006»
15 years 9 months ago
Design and evaluation of steganography for voice-over-IP
—According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-...
Christian Krätzer, Jana Dittmann, Thomas Voge...