Sciweavers

524 search results - page 2 / 105
» On the Security of the DeKaRT Primitive
Sort
View
EG
2007
86views more  EG 2007»
14 years 9 months ago
Towards secure online elections: models, primitives and open issues
: Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be ...
Emmanouil Magkos, Panayiotis Kotzanikolaou, Christ...
ICPPW
2009
IEEE
14 years 7 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
96
Voted
IJISEC
2010
121views more  IJISEC 2010»
14 years 8 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
TRUST
2010
Springer
14 years 7 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte
55
Voted
SIS
2007
14 years 11 months ago
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns
Azzam Mourad, Marc-André Laverdière,...