Sciweavers

1843 search results - page 77 / 369
» Securing Class Initialization
Sort
View
NDSS
1999
IEEE
15 years 6 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
128
Voted
WSC
2001
15 years 3 months ago
Security issues in high level architecture based distributed simulation
The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Di...
Asa Elkins, Jeffery W. Wilson, Denis Gracanin
ICASSP
2010
IEEE
15 years 2 months ago
High-resolution glyph-inspection based security system
: © High-Resolution Glyph-Inspection Based Security System Steven J. Simske, Guy Adams HP Laboratories HPL-2010-42 Image forensics, CMOS imaging, authentication, print parasitics,...
Steven J. Simske, Guy Adams
126
Voted
ENTCS
2006
145views more  ENTCS 2006»
15 years 2 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...