Sciweavers

2601 search results - page 251 / 521
» Secure Rewarding Schemes
Sort
View
160
Voted
CHES
2006
Springer
137views Cryptology» more  CHES 2006»
15 years 7 months ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...
135
Voted
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
15 years 5 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
ACSW
2007
15 years 5 months ago
A Range Test Secure in the Active Adversary Model
In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in an interval range. Their solution is more efficien...
Kun Peng, Ed Dawson
CIC
2006
124views Communications» more  CIC 2006»
15 years 5 months ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
118
Voted
CNIS
2006
15 years 5 months ago
Design of a virtual computer security lab
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...
Jörg Keller, Ralf Naues