Sciweavers

3486 search results - page 76 / 698
» On the Design and Security of RC2
Sort
View
CASES
2010
ACM
14 years 9 months ago
Improving the quality of ring oscillator PUFs on FPGAs
Physical Unclonable Functions (PUFs) based on Ring Oscillators (ROs) are a promising primitive for FPGA security. However, the quality of their implementation depends on several d...
Dominik Merli, Frederic Stumpf, Claudia Eckert
GIS
2010
ACM
14 years 9 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
CCS
2009
ACM
15 years 5 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
79
Voted
WWW
2008
ACM
15 years 11 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
15 years 6 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...