Sciweavers

712 search results - page 28 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
CCS
2004
ACM
15 years 3 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner
SOUPS
2009
ACM
15 years 4 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
PAISI
2007
Springer
15 years 3 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
14 years 9 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini
MOC
2010
14 years 4 months ago
Discontinuous Galerkin approximations of the Stokes and Navier-Stokes equations
Numerical schemes to compute approximate solutions of the evolutionary Stokes and Navier-Stokes equations are studied. The schemes are discontinuous in time and conforming in space...
Konstantinos Chrysafinos, Noel Walkington