Sciweavers

849 search results - page 104 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
15 years 11 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 10 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
ENTCS
2007
79views more  ENTCS 2007»
15 years 4 months ago
Towards Trustworthy Spatial Messaging
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. F...
Michel Deriaz, Jean-Marc Seigneur
CCR
2000
93views more  CCR 2000»
15 years 4 months ago
On the validity of digital signatures
An important feature of digital signatures is to serve as nonrepudiation evidence. To be eligible as non-repudiation evidence, a digital signature on an electronic document should...
Jianying Zhou, Robert H. Deng
CCR
1999
138views more  CCR 1999»
15 years 4 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...