Sciweavers

1843 search results - page 47 / 369
» Securing Class Initialization
Sort
View
ICIW
2007
IEEE
15 years 8 months ago
Towards Secure Mobile P2P Systems
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additiona...
James Walkerdine, Simon Lock
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
CSREASAM
2003
15 years 3 months ago
Assessing Power Substation Network Security and Survivability: A Work in Progress Report
This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vul...
Carol Taylor, Paul W. Oman, Axel W. Krings
TCC
2009
Springer
169views Cryptology» more  TCC 2009»
16 years 2 months ago
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms
Abstract. Goldreich (ECCC 2000) proposed a candidate one-way function construction which is parameterized by the choice of a small predicate (over d = O(1) variables) and of a bipa...
James Cook, Omid Etesami, Rachel Miller, Luca Trev...
ESEM
2009
ACM
15 years 8 months ago
Progress report on the experimental evaluation of security inspection guidance
Although security inspections have proven to be a very efficient means for assuring software security early in the software development lifecycle, they are not used extensively be...
Frank Elberzhager, Marek Jawurek, Christian Jung, ...