Sciweavers

947 search results - page 63 / 190
» Provable Implementations of Security Protocols
Sort
View
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
13 years 11 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
ECOOP
2009
Springer
16 years 14 days ago
Security Monitor Inlining for Multithreaded Java
Abstract. Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
VLSID
2004
IEEE
119views VLSI» more  VLSID 2004»
16 years 6 days ago
Bridge Over Troubled Wrappers: Automated Interface Synthesis
System-on-Chip (SoC) design methodologies rely heavily on reuse of intellectual property (IP) blocks. IP reuse is a labour intensive and time consuming process as IP blocks often ...
Vijay D'Silva, S. Ramesh, Arcot Sowmya
PERCOM
2004
ACM
15 years 11 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark
109
Voted
COMCOM
2008
91views more  COMCOM 2008»
14 years 12 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia