Sciweavers

949 search results - page 145 / 190
» Design methods for security and trust
Sort
View
ISCAS
2008
IEEE
102views Hardware» more  ISCAS 2008»
15 years 10 months ago
Asynchronous balanced gates tolerant to interconnect variability
Abstract— Existing methods of gate level power attack countermeasures depend on exact capacitance matching of the dual-rail data outputs of each gate. Process variability and a l...
Konrad J. Kulikowski, Vyas Venkataraman, Zhen Wang...
MOBISYS
2007
ACM
16 years 4 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
SACMAT
2003
ACM
15 years 9 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ASIACRYPT
2003
Springer
15 years 9 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
MMMACNS
2001
Springer
15 years 8 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato