Sciweavers

546 search results - page 21 / 110
» On the Power of Secure Two-Party Computation
Sort
View
EUC
2006
Springer
15 years 1 months ago
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream applications of ubiquitous computing. They are slowly being integrated into our infrastructure and ...
Jens-Peter Kaps, Berk Sunar
CORR
2011
Springer
143views Education» more  CORR 2011»
14 years 1 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
ACSAC
2007
IEEE
15 years 4 months ago
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting
Special purpose trusted computing devices are currently being deployed to offer many services for which the general purpose computing paradigm is unsuitable. The nature of the ser...
Aggelos Kiayias, Laurent Michel, Alexander Russell...
SMC
2007
IEEE
108views Control Systems» more  SMC 2007»
15 years 3 months ago
Cybersecurity for electric power control and automation systems
—Disruption of electric power operations can be catastrophic on the national security and economy. Due to the complexity of widely dispersed assets and the interdependency betwee...
Chee-Wooi Ten, Manimaran Govindarasu, Chen-Ching L...
PERCOM
2005
ACM
15 years 9 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...