Sciweavers

677 search results - page 12 / 136
» Secure Pseudonymous Channels
Sort
View
ICUIMC
2011
ACM
14 years 1 months ago
MundoMessage: enabling trustworthy ubiquitous emergency communication
Efficient emergency communication is of high practical importance, but has specific challenges: unpredictable local emergency situations harden the establishment of communication...
Stefan G. Weber, Yulian Kalev, Sebastian Ries, Max...
HASE
2008
IEEE
15 years 4 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
88
Voted
CSFW
2012
IEEE
13 years 1 days ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
ACSAC
2006
IEEE
15 years 3 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee
SEC
2004
14 years 11 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov