Sciweavers

2237 search results - page 17 / 448
» On the Security of Random Sources
Sort
View
CCS
2003
ACM
15 years 2 months ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
ISSE
2010
14 years 4 months ago
Randomized constraint solvers: a comparative study
Mitsuo Takaki, Diego Cavalcanti, Rohit Gheyi, Juli...
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
67
Voted
SPW
2005
Springer
15 years 3 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund