Sciweavers

341 search results - page 57 / 69
» Deniable Functional Encryption
Sort
View
ASWEC
2007
IEEE
15 years 2 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
COMPSAC
2009
IEEE
15 years 2 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 2 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
15 years 2 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar
USENIX
2001
14 years 12 months ago
Fast Indexing: Support for Size-Changing Algorithms in Stackable File Systems
Stackable file systems can provide extensible file system functionality with minimal performance overhead and development cost. However, previous approaches provide only limited f...
Erez Zadok, Johan M. Andersen, Ion Badulescu, Jaso...