Sciweavers

1564 search results - page 73 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
15 years 3 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
15 years 3 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
DFN
2004
14 years 11 months ago
SIP Security
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman
68
Voted
USENIX
2007
15 years 4 days ago
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication
In many environments, a computer system is severely constrained to the extent that the practical input mechanisms are merely binary switches. Requiring the user to remember a long...
Umut Topkara, Mercan Topkara, Mikhail J. Atallah