Sciweavers

773 search results - page 47 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ICSE
2009
IEEE-ACM
15 years 8 months ago
Creating and evolving software by searching, selecting and synthesizing relevant source code
When programmers develop or maintain software, they instinctively sense that there are fragments of code that other developers implemented somewhere, and these code fragments coul...
Denys Poshyvanyk, Mark Grechanik
NTMS
2009
IEEE
15 years 8 months ago
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Abstract—It is well known that the suitability of many cryptographic algorithms decreases with time. Hence, it is a challenging task to maintain the integrity, authenticity, con...
Detlef Hühnlein, Ulrike Korte, Lucie Langer, ...
112
Voted
ICCCN
2007
IEEE
15 years 8 months ago
Safeguarding Mutable Fields in AODV Route Discovery Process
— Assuring cryptographic integrity of mutable fields in any on-demand ad hoc routing protocol is more challenging than that of non mutable fields. We propose an efficient auth...
Kulasekaran A. Sivakumar, Mahalingam Ramkumar
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
CCS
2005
ACM
15 years 7 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang