Sciweavers

1183 search results - page 110 / 237
» On flow-sensitive security types
Sort
View
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 11 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
WKDD
2008
CPS
97views Data Mining» more  WKDD 2008»
15 years 11 months ago
Knowledge Management in the Ubiquitous Software Development
The continuous technical advances have lead to the proliferation of very small and very cheap microprocessors, equipped with sensors and capacity of wireless communication. The in...
José Miguel Rubio León
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
15 years 9 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond
137
Voted
ASIACRYPT
1998
Springer
15 years 8 months ago
Optimal Resistance Against the Davies and Murphy Attack
Abstract. In recent years, three main types of attacks have been developed against Feistel-based ciphers, such as DES[1]; these attacks are linear cryptanalysis[2], differential cr...
Thomas Pornin
101
Voted
CORR
2008
Springer
96views Education» more  CORR 2008»
15 years 4 months ago
On the Superdistribution of Digital Goods
: Business models involving buyers of digital goods in the distribution process are called superdistribution schemes. We review the state-of-the art of research and application of ...
Andreas U. Schmidt