Sciweavers

5476 search results - page 44 / 1096
» Resettably Secure Computation
Sort
View
DAC
2009
ACM
15 years 3 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
142
Voted
AINA
2008
IEEE
15 years 12 months ago
Fortification of IT Security by Automatic Security Advisory Processing
Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl
162
Voted
ICASSP
2011
IEEE
14 years 9 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...
IEEESP
2010
99views more  IEEESP 2010»
15 years 4 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
INFOCOM
2011
IEEE
14 years 9 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang