Sciweavers

621 search results - page 65 / 125
» Efficient Secure Multi-party Computation
Sort
View
COMPSEC
2008
138views more  COMPSEC 2008»
15 years 21 days ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
15 years 7 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
92
Voted
CCS
2010
ACM
15 years 24 days ago
The security of modern password expiration: an algorithmic framework and empirical analysis
This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely revoking access to an account by an attacker who has ...
Yinqian Zhang, Fabian Monrose, Michael K. Reiter
128
Voted
IJNSEC
2006
77views more  IJNSEC 2006»
15 years 17 days ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
83
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 16 days ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang