Sciweavers

5722 search results - page 33 / 1145
» Security Function Interactions
Sort
View
94
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
15 years 2 months ago
Security Analysis of Double Length Compression Function Based on Block Cipher
Pin Lin, Wenling Wu, Chuankun Wu
46
Voted
IEEESP
2010
46views more  IEEESP 2010»
15 years 1 months ago
New Security Architectures Based on Emerging Disk Functionality
Kevin R. B. Butler, Stephen E. McLaughlin, Thomas ...
113
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Zero-Knowledge and Code Obfuscation
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not ...
Satoshi Hada
106
Voted
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 8 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
125
Voted
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
15 years 5 months ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee