Sciweavers

495 search results - page 59 / 99
» MASC - Monitoring and Security of Containers
Sort
View
CARDIS
1998
Springer
109views Hardware» more  CARDIS 1998»
15 years 5 months ago
The Vault, an Architecture for Smartcards to Gain Infinite Memory
Smartcard chips vendors have always done their best to embed more memory inside cards. These efforts are driven to allow their customers smartcard manufacturers - to mask more soft...
Patrick Biget
FSE
1997
Springer
112views Cryptology» more  FSE 1997»
15 years 5 months ago
A Family of Trapdoor Ciphers
This paper presents several methods to construct trapdoor block ciphers. A trapdoor cipher contains some hidden structure; knowledge of this structure allows an attacker to obtain ...
Vincent Rijmen, Bart Preneel
CAV
2007
Springer
212views Hardware» more  CAV 2007»
15 years 5 months ago
A Tutorial on Satisfiability Modulo Theories
Abstract. Solvers for satisfiability modulo theories (SMT) check the satisfiability of first-order formulas containing operations from various theories such as the Booleans, bit-ve...
Leonardo Mendonça de Moura, Bruno Dutertre,...
FC
2010
Springer
163views Cryptology» more  FC 2010»
15 years 5 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov
CIKM
2008
Springer
15 years 3 months ago
Privacy-preserving data publishing for horizontally partitioned databases
There is an increasing need for sharing data repositories containing personal information across multiple distributed, possibly untrusted, and private databases. Such data sharing...
Pawel Jurczyk, Li Xiong