Sciweavers

5722 search results - page 293 / 1145
» Security Function Interactions
Sort
View
ISW
2007
Springer
15 years 9 months ago
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports an...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
ACSAC
2006
IEEE
15 years 9 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh
CCGRID
2006
IEEE
15 years 9 months ago
gSET: Trust Management and Secure Accounting for Business in the Grid
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
Thomas Weishäupl, Christoph Witzany, Erich Sc...
ICICS
2004
Springer
15 years 8 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
165
Voted
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
15 years 7 months ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen