Sciweavers

1186 search results - page 181 / 238
» A New Approach to Secure Logging
Sort
View
98
Voted
CARDIS
1998
Springer
110views Hardware» more  CARDIS 1998»
15 years 4 months ago
Reducing the Collision Probability of Alleged Comp128
Wagner, Goldberg and Briceno have recently published an attack [2] on what they believe to be Comp128, the GSM A3A8 authentication hash function [1]. Provided that the attacker has...
Helena Handschuh, Pascal Paillier
121
Voted
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
15 years 2 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
84
Voted
DAGSTUHL
2007
15 years 2 months ago
Towards a General Framework for Modelling Roles
Role is a widespread concept, it is used in many areas like MAS, Programming Languages, Organizations, Security and OO modelling. Unfortunately, it seems that the literature is not...
Valerio Genovese
70
Voted
GEOINFO
2007
15 years 2 months ago
The Development of a Large Scale Geospatial Telecommunications Application Independent from GIS
This article presents the evolution of a very large geospatial database and application developed for telecommunications outside plant management. The needs for the construction of...
Eliane Z. Victorelli Dias, Geovane Cayres Magalh&a...
94
Voted
CORR
2010
Springer
89views Education» more  CORR 2010»
15 years 20 days ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi