Sciweavers

1564 search results - page 89 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
15 years 2 months ago
Rotational Cryptanalysis of ARX
In this paper we analyze the security of systems based on modular additions, rotations, and XORs (ARX systems). We provide both theoretical support for their security and practical...
Dmitry Khovratovich, Ivica Nikolic
AGENTS
2001
Springer
15 years 2 months ago
Specifying agent behavior as concurrent tasks
Software agents are currently the subject of much research in many interrelated fields. Unfortunately, there has not been enough emphasis on defining the techniques required to bu...
Scott A. DeLoach
ARITH
1999
IEEE
15 years 2 months ago
Montgomery Modular Exponentiation on Reconfigurable Hardware
It is widely recognized that security issues will play a crucial role in the majority of future computer and communication systems. Central tools for achieving system security are...
Thomas Blum
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 1 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
SEC
2003
14 years 11 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel