Sciweavers

6555 search results - page 1066 / 1311
» Secure attribute-based systems
Sort
View
SIGECOM
2010
ACM
165views ECommerce» more  SIGECOM 2010»
15 years 8 months ago
Computing optimal strategies to commit to in extensive-form games
Computing optimal strategies to commit to in general normal-form or Bayesian games is a topic that has recently been gaining attention, in part due to the application of such algo...
Joshua Letchford, Vincent Conitzer
123
Voted
CASES
2009
ACM
15 years 8 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
ADHOCNETS
2009
Springer
15 years 8 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
126
Voted
EUROCRYPT
2001
Springer
15 years 8 months ago
Key Recovery and Message Attacks on NTRU-Composite
NTRU is a fast public key cryptosystem presented in 1996 by Hoffstein, Pipher and Silverman of Brown University. It operates in the ring of polynomials Z[X]/(XN − 1), where the ...
Craig Gentry
ICCS
2001
Springer
15 years 8 months ago
Supporting Car-Parrinello Molecular Dynamics with UNICORE
This paper presents the integration of application specific interfaces in the UNICORE Grid infrastructure. UNICORE provides a seamless and secure mechanism to access distributed s...
Valentina Huber
« Prev « First page 1066 / 1311 Last » Next »