Sciweavers

4330 search results - page 131 / 866
» Analyzing security architectures
Sort
View
MOBISYS
2008
ACM
16 years 4 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
CCS
2005
ACM
15 years 10 months ago
A model and architecture for pseudo-random generation with applications to /dev/random
We present a formal model and a simple architecture for robust pseudorandom generation that ensures resilience in the face of an observer with partial knowledge/control of the gen...
Boaz Barak, Shai Halevi
133
Voted
UML
1999
Springer
15 years 9 months ago
Using the UML for Architectural Description
Abstract. There is much interest in using the Unified Modeling Language (UML) for architectural description – those techniques by which architects sketch, capture, model, docume...
Rich Hilliard
165
Voted
CCS
1999
ACM
15 years 9 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
113
Voted
EVOTING
2004
91views Hardware» more  EVOTING 2004»
15 years 6 months ago
From Legal Principles to an Internet Voting System
: Past research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Secon...
Melanie Volkamer, Dieter Hutter