Sciweavers

2108 search results - page 252 / 422
» Encrypted
Sort
View
ESORICS
2009
Springer
16 years 4 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
POPL
2004
ACM
16 years 4 months ago
A bisimulation for dynamic sealing
We define seal, an untyped call-by-value -calculus with primitives for protecting abstract data by sealing, and develop a bisimulation proof method that is sound and complete with...
Eijiro Sumii, Benjamin C. Pierce
PERCOM
2004
ACM
16 years 3 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
ICCD
2008
IEEE
109views Hardware» more  ICCD 2008»
16 years 1 months ago
Suitable cache organizations for a novel biomedical implant processor
— This paper evaluates various instruction- and data-cache organizations in terms of performance, power, energy and area on a suitably selected biomedical benchmark suite. The be...
Christos Strydis
CCS
2010
ACM
15 years 11 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang