Sciweavers

2601 search results - page 245 / 521
» Secure Rewarding Schemes
Sort
View
152
Voted
FPL
2006
Springer
147views Hardware» more  FPL 2006»
15 years 7 months ago
Secure Content Distribution System Based on Run-Time Partial Hardware Reconfiguration
A secure content distribution system is prototyped based on run-time partial reconfigurability of an FPGA. The system provides a robust content protection scheme for online conten...
Yohei Hori, Hiroyuki Yokoyama, Kenji Toda
131
Voted
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
127
Voted
ESORICS
2008
Springer
15 years 5 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot
EG
2007
86views more  EG 2007»
15 years 3 months ago
Towards secure online elections: models, primitives and open issues
: Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be ...
Emmanouil Magkos, Panayiotis Kotzanikolaou, Christ...
IJISEC
2007
88views more  IJISEC 2007»
15 years 3 months ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...