Sciweavers

8655 search results - page 262 / 1731
» Challenges for Trusted Computing
Sort
View
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 8 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
DEBS
2003
ACM
15 years 8 months ago
Role-based access control for publish/subscribe middleware architectures
Research into publish/subscribe messaging has so far done little to propose architectures for the support of access control, yet this will be an increasingly critical requirement ...
András Belokosztolszki, David M. Eyers, Pet...
111
Voted
TRUST
2010
Springer
15 years 8 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
120
Voted
CCS
2001
ACM
15 years 7 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
DBSEC
2003
137views Database» more  DBSEC 2003»
15 years 4 months ago
Certifying Data from Multiple Sources
Abstract Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data...
Glen Nuckolls, Charles U. Martel, Stuart G. Stubbl...