Sciweavers

1825 search results - page 183 / 365
» Cryptographic Securities Exchanges
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 9 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
ESOP
2005
Springer
15 years 9 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
15 years 9 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 9 months ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook