Sciweavers

3482 search results - page 207 / 697
» Designing for security
Sort
View
158
Voted
CORR
2006
Springer
125views Education» more  CORR 2006»
15 years 5 months ago
Reversible Logic to Cryptographic Hardware: A New Paradigm
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed i...
Himanshu Thapliyal, Mark Zwolinski
109
Voted
EUROPKI
2004
Springer
15 years 10 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 11 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
146
Voted
IEEEARES
2010
IEEE
15 years 12 months ago
Investigating the Limitations of Java Annotations for Input Validation
—Recently Java annotations have received a lot of attention as a possible way to simplify the usage of various frameworks, ranging from persistence and verification to security....
Federico Mancini, Dag Hovland, Khalid A. Mughal
CCS
2011
ACM
14 years 5 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King