Sciweavers

1757 search results - page 36 / 352
» Secure Content Validation
Sort
View
TC
1998
14 years 10 months ago
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
Abstract—A widely used bus-encryption microprocessor is vulnerable to a new practical attack. This type of processor decrypts onthe-fly while fetching code and data, which are st...
Markus G. Kuhn
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
15 years 4 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...
80
Voted
NSDI
2008
15 years 1 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
DRM
2008
Springer
15 years 26 days ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
ISCIS
2004
Springer
15 years 4 months ago
Modeling Dynamic Web Content
Web sites have become increasingly complex and offer a large variety of services and contents. The proliferation of dynamic Web contents opens up new challenging performance and s...
Antonio Barili, Mariacarla Calzarossa, Daniele Tes...