Sciweavers

148 search results - page 12 / 30
» Ethics in Security Vulnerability Research
Sort
View
ISSA
2004
15 years 1 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
ESORICS
1998
Springer
15 years 4 months ago
Side Channel Cryptanalysis of Product Ciphers
Building on the work of Kocher[Koc96], Jaffe, and Yun [KJY98], we discuss the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion o...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
JSAC
2006
121views more  JSAC 2006»
14 years 11 months ago
Secure localization and authentication in ultra-wideband sensor networks
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the ...
Yanchao Zhang, Wei Liu, Yuguang Fang, Dapeng Wu
SOUPS
2006
ACM
15 years 5 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
FC
2003
Springer
133views Cryptology» more  FC 2003»
15 years 5 months ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo