Sciweavers

5722 search results - page 441 / 1145
» Security Function Interactions
Sort
View
CSFW
2008
IEEE
15 years 11 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
CRYPTO
2001
Springer
113views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
OAEP Reconsidered
The OAEP encryption scheme was introduced by Bellare and Rogaway at Eurocrypt ’94. It converts any trapdoor permutation scheme into a public-key encryption scheme. OAEP is widel...
Victor Shoup
CASES
2005
ACM
15 years 6 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
BIRD
2008
Springer
163views Bioinformatics» more  BIRD 2008»
15 years 6 months ago
Multi-functional Protein Clustering in PPI Networks
Abstract. Protein-Protein Interaction (PPI) networks contain valuable information for the isolation of groups of proteins that participate in the same biological function. Many pro...
Clara Pizzuti, Simona E. Rombo