Sciweavers

414 search results - page 62 / 83
» Secure Border Control Processes
Sort
View
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 6 months ago
A Novel Concept: Message Driven Frequency Hopping (MDFH)
—Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems,...
Qi Ling, Tongtong Li, Zhi Ding
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
15 years 5 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 5 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
IFIP
2004
Springer
15 years 5 months ago
Dynamic Typing with Dependent Types
Dependent type systems are promising tools programmers can use to increase the reliability and security of their programs. Unfortunately, dependently-typed programming languages re...
Xinming Ou, Gang Tan, Yitzhak Mandelbaum, David Wa...
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 5 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu