Sciweavers

712 search results - page 26 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
IJWMC
2006
112views more  IJWMC 2006»
14 years 9 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
ACSAC
2009
IEEE
15 years 4 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
82
Voted
ISI
2005
Springer
15 years 3 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
WPES
2005
ACM
15 years 3 months ago
Peripheral privacy notifications for wireless networks
This study aims to develop techniques for allowing users to form more accurate expectations of privacy. We have developed a peripheral display for notifying users when their compu...
Braden Kowitz, Lorrie Faith Cranor
ACSAC
2003
IEEE
15 years 3 months ago
Security Design in Online Games
The emergence of online games has fundamentally changed security requirements for computer games, which previously were largely concerned with copy protection. In this paper, we e...
Jeff Jianxin Yan