Sciweavers

1656 search results - page 189 / 332
» Secure Computation Without Authentication
Sort
View
133
Voted
CASES
2010
ACM
14 years 11 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
126
Voted
MASS
2010
156views Communications» more  MASS 2010»
14 years 10 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
89
Voted
ITCC
2005
IEEE
15 years 6 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis
77
Voted
CHI
2006
ACM
16 years 1 months ago
RoomBugs: simulating insect infestations in elementary classrooms
This paper presents research on a collaborative learning environment in an urban elementary science classroom. The application, called RoomBugs, simulates a dynamic ecosystem of i...
Michael Barron, Tom Moher, Jeff Maharry
102
Voted
AINA
2006
IEEE
15 years 4 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer