Sciweavers

947 search results - page 147 / 190
» Provable Implementations of Security Protocols
Sort
View
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
148
Voted
SAINT
2008
IEEE
15 years 10 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
139
Voted
EEE
2005
IEEE
15 years 9 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry
113
Voted
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 9 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
145
Voted
OOPSLA
1990
Springer
15 years 7 months ago
Exception Handling and Object-Oriented Programming: Towards a Synthesis
The paper presents a discussion and a specification of an exception handling system dedicated to object-oriented programming. We show how a full object-oriented representation of ...
Christophe Dony