Sciweavers

677 search results - page 29 / 136
» Secure Pseudonymous Channels
Sort
View
CCS
2010
ACM
14 years 10 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
CORR
2007
Springer
109views Education» more  CORR 2007»
14 years 9 months ago
The MIMOME Channel
— The MIMOME channel is a Gaussian wiretap channel in which the sender, receiver, and eavesdropper all have multiple antennas. We characterize the secrecy capacity as the saddle-...
Ashish Khisti, Gregory W. Wornell
CRYPTOLOGIA
2010
14 years 7 months ago
Internet Voting Protocol Based on Improved Implicit Security
This paper presents an improved protocol for Internet voting that allows recasting of ballots to eliminate voting errors, encourages early voting and provides an opportunity for c...
Abhishek Parakh, Subhash Kak
IJNSEC
2006
131views more  IJNSEC 2006»
14 years 9 months ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou
CORR
2008
Springer
103views Education» more  CORR 2008»
14 years 9 months ago
Secret Communication with Feedback
Secure communication with feedback is studied. An achievability scheme in which the backward channel is used to generate a shared secret key is proposed. The scenario of binary sy...
Deniz Gündüz, D. Richard Brown III, H. V...