Sciweavers

2281 search results - page 344 / 457
» Security Patterns and Secure Systems Design
Sort
View
MDM
2005
Springer
127views Communications» more  MDM 2005»
15 years 9 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
FPL
2004
Springer
143views Hardware» more  FPL 2004»
15 years 7 months ago
Exploring Area/Delay Tradeoffs in an AES FPGA Implementation
Abstract. Field-Programmable Gate Arrays (FPGAs) have lately become a popular target for implementing cryptographic block ciphers, as a well-designed FPGA solution can combine some...
Joseph Zambreno, David Nguyen, Alok N. Choudhary
SAFECOMP
2004
Springer
15 years 9 months ago
How Explicit Are the Barriers to Failure in Safety Arguments?
Safety cases embody arguments that demonstrate how safety properties of a system are upheld. Such cases implicitly document the barriers that must exist between hazards and vulnera...
Shamus P. Smith, Michael D. Harrison, Bastiaan A. ...
129
Voted
WWW
2006
ACM
16 years 4 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
EUROPKI
2009
Springer
15 years 1 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...