Sciweavers

2517 search results - page 186 / 504
» Secure Deployment of Components
Sort
View
DAC
2009
ACM
15 years 1 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
16 years 4 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
WISTP
2010
Springer
15 years 11 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
DRM
2009
Springer
15 years 10 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
IEEEARES
2010
IEEE
15 years 8 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser