Sciweavers

2108 search results - page 255 / 422
» Encrypted
Sort
View
DEXAW
2009
IEEE
124views Database» more  DEXAW 2009»
15 years 11 months ago
Performance Comparison of Secure Comparison Protocols
Secure Multiparty Computation (SMC) has gained tremendous importance with the growth of the Internet and E-commerce, where mutually untrusted parties need to jointly compute a fun...
Florian Kerschbaum, Debmalya Biswas, Sebastiaan de...
ICASSP
2009
IEEE
15 years 11 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 11 months ago
Cryptanalysis of Substitution Cipher Chaining Mode (SCC)
In this paper, we present an enhanced cryptanalysis of the Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC which uses AES with 128-bit key) was broken using 5 att...
Mohamed Abo El-Fotouh, Klaus Diepold
SIES
2009
IEEE
15 years 11 months ago
A flexible design flow for software IP binding in commodity FPGA
— Software intellectual property (SWIP) is a critical component of increasingly complex FPGA based system on chip (SOC) designs. As a result, developers want to ensure that their...
Michael Gora, Abhranil Maiti, Patrick Schaumont
NDSS
2009
IEEE
15 years 11 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...