Sciweavers

1843 search results - page 240 / 369
» Securing Class Initialization
Sort
View
112
Voted
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icart's deterministic enco...
Eric Brier, Jean-Sébastien Coron, Thomas Ic...
GLOBECOM
2008
IEEE
15 years 1 months ago
A Framework for Dual-Agent MANET Routing Protocols
— Nodes forming mobile ad hoc networks (MANET) nodes can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) of the mobile device...
Brian L. Gaines, Mahalingam Ramkumar
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 24 days ago
JIT Spraying and Mitigations
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Random...
Piotr Bania
ECCC
2008
98views more  ECCC 2008»
15 years 24 days ago
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approximating the minimum distance on n-dimensional lattices to within small poly(n) fact...
Chris Peikert
COMCOM
2006
62views more  COMCOM 2006»
15 years 23 days ago
Self-monitoring of wireless sensor networks
This paper presents an efficient distributed self-monitoring mechanism for a class of wireless sensor networks used for monitoring and surveillance. In these applications, it is i...
Chih-fan Hsin, Mingyan Liu