Sciweavers

5665 search results - page 234 / 1133
» Introduction to Computer Security
Sort
View
91
Voted
CSI
2008
113views more  CSI 2008»
15 years 17 days ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath
87
Voted
CN
1999
88views more  CN 1999»
15 years 5 days ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart
100
Voted
IJNSEC
2010
127views more  IJNSEC 2010»
14 years 7 months ago
Identity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an...
Hu Xiong, Zhiguang Qin, Fagen Li
87
Voted
CORR
2008
Springer
85views Education» more  CORR 2008»
15 years 17 days ago
Quantifying Timing Leaks and Cost Optimisation
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
111
Voted
JOC
2008
86views more  JOC 2008»
15 years 14 days ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell