Sciweavers

6555 search results - page 976 / 1311
» Secure attribute-based systems
Sort
View
162
Voted
ICICS
2007
Springer
15 years 8 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
HOST
2009
IEEE
15 years 8 months ago
New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
Hardware Trojans in integrated circuits and systems have become serious concern to fabless semiconductor industry and government agencies in recent years. Most of the previously p...
Hassan Salmani, Mohammad Tehranipoor, Jim Plusquel...
113
Voted
ACSAC
2004
IEEE
15 years 8 months ago
Role-Based Delegation Model/ Hierarchical Roles (RBDM1)
The basic idea behind delegation is that some active entity in a system delegates authority to another active entity in order to carry out some functions on behalf of the former. ...
Ezedin Barka, Ravi S. Sandhu
ACSAC
2004
IEEE
15 years 8 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
ACNS
2006
Springer
241views Cryptology» more  ACNS 2006»
15 years 8 months ago
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Sub...