Sciweavers

1183 search results - page 73 / 237
» On flow-sensitive security types
Sort
View
CNIS
2006
15 years 6 months ago
Design of a virtual computer security lab
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...
Jörg Keller, Ralf Naues
135
Voted
IFIP11
2004
110views Business» more  IFIP11 2004»
15 years 6 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
157
Voted
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
15 years 4 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
123
Voted
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 10 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
135
Voted
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 9 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell