— This paper analyzes the security of a new multistage encryption system (MES) recently proposed in ISCAS’2004. It is found that MES is insecure against a differential chosenpl...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Abstract—This paper analyzes energy characteristics of parallel algorithms executed on scalable multicore processors. Specifically, we provide a methodology for evaluating energ...