Sciweavers

677 search results - page 85 / 136
» Secure Pseudonymous Channels
Sort
View
EUROSYS
2007
ACM
15 years 9 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
ICCSA
2009
Springer
15 years 6 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
CCS
2007
ACM
15 years 6 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
ACSAC
2005
IEEE
15 years 5 months ago
The Pump: A Decade of Covert Fun
This paper traces the ten plus year history of the Naval Research Laboratory’s Pump idea. The Pump was theorized, designed, and built at the Naval Research Laboratory’s Center...
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
SUTC
2010
IEEE
15 years 3 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...