Sciweavers

1564 search results - page 116 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
15 years 1 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
ESORICS
2006
Springer
15 years 1 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
ESORICS
2008
Springer
14 years 11 months ago
A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures u...
Carlo Blundo, Emiliano De Cristofaro, Aniello Del ...
ATAL
2010
Springer
14 years 11 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
14 years 11 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov