Sciweavers

3349 search results - page 81 / 670
» Data Security
Sort
View
ITNG
2007
IEEE
15 years 9 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan
115
Voted
OOPSLA
1998
Springer
15 years 7 months ago
Data Groups: Specifying the Modification of Extended State
This paper explores the interpretation of specifications in the context of an object-oriented programming language with subclassing and method overrides. In particular, the paper ...
K. Rustan M. Leino
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 8 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
FSE
1998
Springer
79views Cryptology» more  FSE 1998»
15 years 7 months ago
On the Design and Security of RC2
The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper we describe both the cipher and preliminary attempts to use both differential and l...
Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest,...
IADIS
2003
15 years 4 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire