Sciweavers

3420 search results - page 521 / 684
» A Language-Based Approach to Security
Sort
View
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 11 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
SAINT
2007
IEEE
15 years 11 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
COREGRID
2007
Springer
15 years 11 months ago
Adding metadata to Orc to support reasoning about grid programs
Abstract Following earlier work demonstrating the utility of Orc as a means of specifying and reasoning about grid applications we propose the enhancement of such specifications w...
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick
136
Voted
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 11 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
FPL
2007
Springer
154views Hardware» more  FPL 2007»
15 years 11 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...