Sciweavers

1186 search results - page 101 / 238
» A New Approach to Secure Logging
Sort
View
95
Voted
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 6 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
IJNSEC
2007
194views more  IJNSEC 2007»
15 years 17 days ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 6 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
130
Voted
AVBPA
2005
Springer
271views Biometrics» more  AVBPA 2005»
15 years 6 months ago
Dynamic Approach for Face Recognition Using Digital Image Skin Correlation
With the recent emphasis on homeland security, there is an increased interest in accurate and non-invasive techniques for face recognition. Most of the current techniques perform a...
Satprem Pamudurthy, E. Guan, Klaus Mueller, Miriam...
100
Voted
IPTPS
2004
Springer
15 years 6 months ago
P6P: A Peer-to-Peer Approach to Internet Infrastructure
Abstract— P6P is a new, incrementally deployable networking infrastructure that resolves the growing tensions between the Internet routing infrastructure and the end sites of the...
Lidong Zhou, Robbert van Renesse