Sciweavers

2601 search results - page 180 / 521
» Secure Rewarding Schemes
Sort
View
120
Voted
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
15 years 9 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj
IH
2005
Springer
15 years 9 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
104
Voted
ACISP
2003
Springer
15 years 8 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
130
Voted
ICICS
2001
Springer
15 years 7 months ago
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege leve...
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
NDSS
1999
IEEE
15 years 7 months ago
Secure Remote Access to an Internal Web Server
We address the problem of secure remote access to a site's internal web server from outside the rewall. The goal is to give authorized users access to sensitive information, ...
Christian Gilmore, David P. Kormann, Aviel D. Rubi...